Hi Guest

MobileUser

1 HomePage 1 Jobs 1 WalkIn 1Articles  

Cat Exam
Start a Blog
Develop Your Skill

Develop Your Skill

Develop Your Skill

 :) Latest Topic
AJAX
VB.NET
SQL Query
UDDI
CLASS
JavaScript Questions
SharePoint Interview
SilverLight
WCF
general knowledge
 ASP.NET
 :) Topic of Day
 
 :) Hot Jobs
ASP.NET Developer(2-5 years)(Location:-Gurgaon(http://www.amadeus.co.in))

Software Developer(0-3 years)(Location:-ZENITH SERVICE.Plot 2N-67 BUNGALOW PLOT NEAR 2-3 CHOWK, NEAR APOORVA NURSING HOME N.I.T. FARIDABAD)

Dot Net Developer(6-7 years)(Location:-Chennai)

Software Developer(3-8 years)(Location:-Bengaluru/Bangalore)

 :)
 :) Most Searchable
 
Identify the correct statement in the following in secure programming questions

Different questions on Docker Container Orcas

SaaS supports multiple users and provides a shared data model through ________ model.

50 Latest questions on Azure

In Master-Slave databases, all writes are written to the ____________.

Which of the following services is free?

Cassandra Interview Questions Part

DaaS is utilized for provisioning critical data on demand.

Which of the following is cloud computing key enabling technologies?

Classification problems aid in predicting __________ outputs.

In the public cloud, it incurs high CAPEX and less OPEX.

Developers and organizations all around the world leverage ______ extensively.

Which of the following are secure programming guidelines?

cache Interview Questions Part1

__________ aids in identifying associations, correlations, and frequent patterns in data.


 :) Quiz System
Computer Quiz
Science Quiz
Banking Quiz
Sports Quiz
GK Quiz


  

 
The idea behind “confusion” in cryptography is to hide the relationship between the plaintext and ciphertext. View:-68527
Question Posted on 24 Jul 2020

The idea behind “confusion” in cryptography is to hide the relationship between the plaintext and ciphertext.....
ADS Posted In : Important Topics | Art of Cryptography



The hash function value used in message authentication is also known as __________ View:-53284
Question Posted on 23 Jul 2020

The hash function value used in message authentication is also known as __________
Select correct option ....
ADS Posted In : Important Topics | Art of Cryptography


The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem. View:-62727
Question Posted on 23 Jul 2020

The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem.
Select corr....
ADS Posted In : Important Topics | Art of Cryptography


The strategy used to ensure that the message is a multiple of the cipher block size without compromising the size of the View:-44006
Question Posted on 07 Aug 2020

The strategy used to ensure that the message is a multiple of the cipher block size without compromising the ....
ADS Posted In : Important Topics | Art of Cryptography


RC4 is a block cipher. View:-39329
Question Posted on 07 Aug 2020

RC4 is a block cipher.
Choose the correct option from below list
(1)False
(2)True

Answer....
ADS Posted In : Important Topics | Art of Cryptography


The primary goal of cryptanalysis is to __________. View:-74445
Question Posted on 22 Jul 2020

The primary goal of cryptanalysis is to __________.
Select the correct option from below list
(1)Find....
ADS Posted In : Important Topics | Art of Cryptography


What is the size of the hash value produced by the MD5 algorithm? View:-37968
Question Posted on 21 Jul 2020

What is the size of the hash value produced by the MD5 algorithm?
Choose the correct option from below li....
ADS Posted In : Important Topics | Art of Cryptography


RSA is a Deterministic Encryption Algorithm as there is no random component. View:-48648
Question Posted on 06 Aug 2020

RSA is a Deterministic Encryption Algorithm as there is no random component.
Choose the correct option fr....
ADS Posted In : Important Topics | Art of Cryptography


The method adopted by block cipher modes to generate unique ciphertexts even if the same plaintext is encrypted multiple View:-45241
Question Posted on 06 Aug 2020

The method adopted by block cipher modes to generate unique ciphertexts even if the same plaintext is encrypt....
ADS Posted In : Important Topics | Art of Cryptography


Which of the following poses challenges in the breaking of the Vigenère Cipher? View:-47604
Question Posted on 18 Jul 2020

Which of the following poses challenges in the breaking of the Vigenère Cipher?
Choose the correct option....
ADS Posted In : Important Topics | Art of Cryptography


The cipher generated by combining multiple transformations to enhance the security of the resultant cipher is __________. View:-49262
Question Posted on 04 Aug 2020

The cipher generated by combining multiple transformations to enhance the security of the resultant cipher is....
ADS Posted In : Important Topics | Art of Cryptography


The process that attempts to understand the art and science of encryption and decryption is known as __________. View:-29871
Question Posted on 02 Aug 2020

The process that attempts to understand the art and science of encryption and decryption is known as ________....
ADS Posted In : Important Topics | Art of Cryptography


Encryption helps protect data against __________ View:-45150
Question Posted on 02 Aug 2020

Encryption helps protect data against __________
Choose the correct option from below list
(1)All the....
ADS Posted In : Important Topics | Art of Cryptography


In cryptographic terms, what does cipher indicate? View:-36075
Question Posted on 16 Jul 2020

In cryptographic terms, what does cipher indicate?
Choose the correct option from below list
(1)The e....
ADS Posted In : Important Topics | Art of Cryptography


Kerchkoff’s principle emphasizes that the cryptosystem should be accessible to the adversary without inconvenience. View:-65396
Question Posted on 31 Jul 2020

Kerchkoff’s principle emphasizes that the cryptosystem should be accessible to the adversary without inconven....
ADS Posted In : Important Topics | Art of Cryptography


Which of the following is widely used in cryptography to create a trapdoor function to facilitate the exchange of keys? View:-60531
Question Posted on 30 Jul 2020

Which of the following is widely used in cryptography to create a trapdoor function to facilitate the exchang....
ADS Posted In : Important Topics | Art of Cryptography


The use of hashing algorithms includes ________. View:-67671
Question Posted on 29 Jul 2020

The use of hashing algorithms includes ________.
Choose the correct option from below list
(1)Monitor....
ADS Posted In : Important Topics | Art of Cryptography


Digital Signature is implemented using the __________. View:-63058
Question Posted on 29 Jul 2020

Digital Signature is implemented using the __________.
Choose the correct option from below list
(1)S....
ADS Posted In : Important Topics | Art of Cryptography


The avalanche effect is an undesirable property in cryptographic algorithms. View:-49243
Question Posted on 28 Jul 2020

The avalanche effect is an undesirable property in cryptographic algorithms.
Choose the correct option fr....
ADS Posted In : Important Topics | Art of Cryptography


Select the mode in which computations do not depend on outputs from previous stages. View:-72259
Question Posted on 27 Jul 2020

Select the mode in which computations do not depend on outputs from previous stages.
Choose the correct o....
ADS Posted In : Important Topics | Art of Cryptography


Which among the following best describes hash collision attack? View:-54164
Question Posted on 25 Jul 2020

Which among the following best describes hash collision attack?
Select the correct option from below list....
ADS Posted In : Important Topics | Art of Cryptography


In which of the following cryptographic methods is the order of the units in the data rearranged to form the ciphertext? View:-41924
Question Posted on 17 Jul 2020

In which of the following cryptographic methods is the order of the units in the data rearranged to form the ....
ADS Posted In : Important Topics | Art of Cryptography


The Diffie-Hellman algorithm is applicable for the exchange of keys between two parties only. View:-68384
Question Posted on 10 Aug 2020

The Diffie-Hellman algorithm is applicable for the exchange of keys between two parties only.
Select corr....
ADS Posted In : Important Topics | Art of Cryptography


Which among the following may be addressed using message authentication? View:-64117
Question Posted on 09 Aug 2020

Which among the following may be addressed using message authentication?
Choose the correct option from b....
ADS Posted In : Important Topics | Art of Cryptography


A widely used encryption algorithm that superseded DES as the new standard encryption algorithm is ________. View:-51030
Question Posted on 08 Aug 2020

A widely used encryption algorithm that superseded DES as the new standard encryption algorithm is ________. ....
ADS Posted In : Important Topics | Art of Cryptography


Which of the following is a pitfall in the View:-48207
Question Posted on 07 Aug 2020

Which of the following is a pitfall in the Diffie-Hellman key exchange?
Choose the correct option from be....
ADS Posted In : Important Topics | Art of Cryptography


The algorithm that is considered to have electrified non-military cryptology and cryptanalysis is ________. View:-55594
Question Posted on 06 Aug 2020

The algorithm that is considered to have electrified non-military cryptology and cryptanalysis is ________. <....
ADS Posted In : Important Topics | Art of Cryptography


Which of the following is a major disadvantage of ECB mode? View:-38319
Question Posted on 05 Aug 2020

Which of the following is a major disadvantage of ECB mode?
Choose the correct option from below list
ADS Posted In : Important Topics | Art of Cryptography


Secret Key Cryptography is effective for Communication over insecure channels. View:-45006
Question Posted on 01 Aug 2020

Secret Key Cryptography is effective for Communication over insecure channels.
Choose the correct option ....
ADS Posted In : Important Topics | Art of Cryptography


The security principle that contradicts the idea of “security through obscurity” is _________. View:-13168
Question Posted on 01 Aug 2020

The security principle that contradicts the idea of “security through obscurity” is _________.
Choose the....
ADS Posted In : Important Topics | Art of Cryptography


Which of the following cryptographic strategies may be used to overcome Man-in-the-Middle attacks? View:-46698
Question Posted on 30 Jul 2020

Which of the following cryptographic strategies may be used to overcome Man-in-the-Middle attacks?
Choose....
ADS Posted In : Important Topics | Art of Cryptography


1 2
 
  
 :) Categoriese
BigData(533)
HDP | CDH | Data Lakes | CouchDB | Hadoop | Cassandra | MongoDB | Hive | Cassandra Data Handling | MapReduce | Riak | NoSQL Database Revolution |

Science Technology(469)
Apache NiFi | Cognos | NoSQL Gnosis |

SEO(43)
Apache Pig |

Agile(102)
BigData Faq |

Mathematics(385)
YARN | MongoDB Perpetuus | Apache Phoenix | BigData Questions |

Server(24)
Amazon Databases | HDFS | Hadoop MCQ | Apache HBase | Electrical Machine MCQ | Chemistry Quiz | Physics Quiz | Biology Quiz | Solar System Quiz | Science Quiz | Physics | Biology | Fun Facts | Chemistry Questions | Ranking | Keywords | SEO Tools | Searches |

Important Topics(1616)
Keyword Research | Mobile SEO | Technical SEO | SEO Tips | Google Adwords | Beginners | Agile Questions | Scrum |

CMS(37)
Kanban |

Software(102)
Agile manifesto | Agile Teams | Agile methodology | Agile Model | Agile process | Agile Project | Agile Practitioners | Complex numbers | Problem Solving |

Microsoft InfoPath(4)
Algebra | Regression | Math Quiz | Rack |

Repository Questions(162)
Nginx |

TPF(2)
Mainframe | Application | Dedicated |

Cloud(400)
Mail | Blade | Linear Algebra | Data Visualization | Cybersecurity |

Frameworks(520)
Enlightenment Machine Learning | Conversational Systems | ML Exploring the Model | docker container orcas | Secure Programming | Wireframing | Birst | Art of Cryptography | Bitcoin | Infrastructure as Code | Redux Async | Service Discovery | Digital Primer |

Placement Paper(10)
English Quiz | ServiceNow | Salesforce |

Government Private Jobs(34)
Ingression Deep Learning | Service Deployment Concepts | Digital for Industries |

API(219)
Security Assessment | Leading And Managing Teams | Kibana Data Exquisites | EMC | Statistics and Probability | Hybrid Apps | Wireless Mobile | Keycloak | Internet of Things Prime | APIGEE Developer Services | Digital Marketing Primer | Data Analysis | Apache Druid | Telemarketing | Full Stack Developer | Memcached | Growth and Transformation | Data Science | Image Classification | CyberArk |

Tutorial(200)
Saviynt | Zipkin and Jaeger |

Programming Languages(341)
SAML | OKTA |

PowerShell(15)
NLP Learning Deep Learning | AppML | Clustering the ensemble | User Research Methods | CyberSecurity Quiz | Traefik | Full Stack Development |

Operating System(83)
Endpoint Security | Software Engineering | Azure Synapse Analytics | Consul |

Tools(799)
GitHub |

DotNet(607)
Fortify SCA | Swagger | Business Skills | Domo | OKTA Quiz | AppML MCQ |

DataBase(977)
Regression Analysis | Design Thinking | Web Content Management System | BPO | Phishing | Phishing Quiz | Trends That Matter |

WebServices(45)
OWASP MCQ | Access Modifiers | Web Mining | SAST Checkmarx | GENERATIVE AI | CodeIgniter | Typo3 | Magento | Joomla | Drupal | WordPress | Opencart | VirtueMart | Kohana | Neos | October | Webmull | SilverStripe | Phalcon | Symphony | CakePHP | Easy Git | Fossil | monotone |

OOPS(9)
CVS |

WEB(517)
Bazaar | Darcs | Perforce |

SharePoint(41)
Veracity | TFS | Pijul | BitKeeper | Mercurial | Apache SVN | Git | Secure Code Review | Kibana | Blue Prism |

SilverLight(7)
Tibco | InfoPath Basics | Development |

Artificial Intelligence(108)
Rhodecode | SourceForge |

Java(317)
Launchpad | Phabricator | Gogs | Beanstalk | GitKraken | Launchpad | AWS CodeCommit | Gitea | GitLab | Bitbucket | Prodigious Git | Artifactory | Git Slack Integration | Git Questions | Interstellar Git | Subgit | TPF Questions | Galileo | Apache Allura | AWS | Google Cloud | IBM Cloud | SaaS | PaaS | laaS | Private Cloud | Hybrid Cloud | AWS Essentials | Public Cloud | Informatica | Amazon VPC | Watson AI | AWS Access Management | Openshift | Google Cloud Essential | Cloud Foundry | Chef Mimas | Chef Lapetus | Chef Titan | Bulma MCQ | Koa.js | Fastify | RASA | Grok | Yesod | Padrino | Stripes | Seaside | Web Framework | Vue JS Prolificacy | FuelPHP | Lift | Mason | Spring Boot | Mojolicious | JHipster | Seam | Apache Storm | Quixote | RichFaces | Grails | Bottle | Catalyst | Wt | PRADO | Flutter | Bootstrap Framework | Apache Drill | PyTorch | Microsoft Bot Framework | JSF | Django Web Framework | Jest | IONIC | Workfusion SPA | Spring |

Gernal Knowledge(1785)
Xamarin |

PHP(88)
Zend | Laravel | WCF | WPF | SAP Company | Accenture Paper | HCL Papers | TCS Papers | Group Discussion | Wipro Papers | CTS | IBM | SBI Bank PO | IDBI Bank | Bank Interview | Banking Quiz | API Questions | PouchDB | PySpark | Web API | Apigee API | GraphQL | APIGEE Analytics Services | Java API | API Gateway |

Biztalk(0)
Composite API | Open API | Internal API | Composite API |

Testing(133)
Soap API | FullContact API | Amazon S3 API | Partner API | Mobile Testing Qsn | Postman | REST API MCQ | Git Tutorial | ReactJS Tutorial | Node.js Tutorial | IntelliJ IDEA | SQL | Regex | HTML | C Language | AngularJS | Docker Tutorial | CSS Tutorial | Java Tutorial | C MCQ | C++ Quiz | Lisp | Programming | Coding | Scala Constructs | Dart | Octave | C | Perl |

SAP(211)
COBOL | Pascal | FORTRAN | BASIC | Ada | C++ | Scala | R Basic |

HR(15)
Ruby |

XML(14)
Go | Julia | Swift | Matplotlib | TypeScript | LUA | Machine Learning Axioms | Phython | Rust | TypeScript Code | Node.js MCQ | Data Structure MCQ |

Test and Papers(219)
Powershell Script | PowerShell | Linux | Unix | Solaris | Linux MCQ |

Android(78)
Operating System MCQ | macOS | Windows | Apache Sqoop |

Python Programming(194)
Burp Suite | Google Data Studio |

Applications(56)
Pega |

Trending Technologies(7)
Apache Flume | Selenium WebDriver | SoapUI | RPA with Pega | Nomad | Cucumber | Terraform | Tableau The Prequel |

iOS(8)
Tableau The Sequel | Automation with Grunt | JIRA | UI Design | Automatix | Gradle | K8s | Hcatalog | Maven | ECMAScript | Docker Code |

Computer(248)
Podman |

Apache Hadoop(66)
Prometheus MCQ | Puppet | Grafana MCQ | Kibana Quiz |

Angular(169)
Grafana | Entity Framework | RDLC | MVC | LINQ | C# | Cache | ADO.NET | ASP.NET | VB.NET | DotNet Quiz | DotNet MCQ | ASP.NET Core | Unstructured Data Classification | PostgreSQL | Blockchain Intermedio | SQL DBA MCQ | ArangoDB | DataBase Term | Amazon Neptune | MarkLogic | DB2 | Storytelling with Data | Database Security | Structured Data Classification | Teradata | SQL Query | sql questions | MySQL | DBMS | DataWarehousing |

Script(353)
SQL DBA Questions |

Networking(30)
SQLite | Data Mining Nostos | Blockchain |

Style Sheet(38)
Redis | SSIS | NoSQL | Data Mining | SQL Certification | SQL Quiz | MySQL MCQ | WebServices | UDDI | Amazon Storage (S3) | CLASS | Functions | oops questions | VBScript | AJAX | JQuery | Cloud Computing | IIS Questions | HTML5 |

Quantitative Aptitude(148)
Onsen UI |

BigQuery(38)
NativeScript | Wamp Server | Regex Questions | Node.js | HTML Questions | JSON | Bundling With Webpack | BackboneJS | HTML MCQ Quiz | Handlebars.js | Web Security | Styling With CSS3 | JSON MCQ | JQuery Mobile | Elasticsearch | Framework7 Questions | Safari | SharePoint SourceCode | Powershell Questions | SharePoint Interview |

Protocol(22)
SilverLight | MFDM | AI MCQ | Neural Networks | Automation Anywhere |

Application Server(2)
ChatGPT | TensorFlow |

Roles and Responsibilities(3)
Java Quiz | AWT | JSP | Java Questions | Apache Lucene |

Oracle(5)
Java MCQ | Java8 Innards | beans | Core Java |

Hosting and Domain(4)
Swing | Struts | Servlet | J2EE | EJB | Hibernate | JDBC | Verbal Analogies | Number Puzzle | Logical Puzzle | Interview Questions | general knowledge | Animal Quiz | ISRO GK Questions | Aviation | Logo Quiz | Company Quiz | Sports Quiz | GK Quiz | Plant Quiz | PHP MCQ | PHP Questions | Example | Biztalk Questions | Testing Questions | Manual | Automation | Selenium | SonarQube |

Azure Topics(228)
Bugzilla | SAP Testing | Agile Testing | Mobile Testing | Database Testing | LoadRunner Testing | Manual Testing | JS Qualis | JMeter | Performance Testing | SOAtest | API Testing | TestNG | Jenkins | Risk Based Testing | SAP BODS |

Business Intelligence(6)
SAP FICO |

Accounting(12)
SAP Security |

CAT(613)
SAP ABAP Data Dictionary | SAP HANA Quiz | SAP CRM |

Mobile APP(34)
SAP Basic | HBase | SAP Hana | SAP HR | SAP Payroll | SAP BI | SAP ABAP | FICO | SAP MM | SAP | SAP Interview | SAP HANA Fiori | SAP HANA OTC | HR Questions | Interview Tips | Xml Questions | SVG | XPath |

Microsoft Products(68)
Continuous Integration with Jenkins | Blockchain Potentes Nexus | Ansible Automation Sibelius | IAS Panel |

VBA(1)
Continuous deployment | Weaveworks | Continuous Integration | Ansible |

REST(6)
Bower | Deep Learning | Docker | Microservices |

GDS(3)
Spark SQL | Gulp |

Reporting Services(1)
Aptitude Test | Puzzle | Logical Reasoning | Mathematical Rules | Android Interview Questions | Android Quiz | Python Questions | Stats with Python | NLP Using Python | Python Pandas |

SQL Server(4)
Python 3 | Python Quiz | NumPy | Python Qualis | TIBCO EMS | Kafka Premiera Ola | CAT FAQ | CAT DILR | CAT VARC | CAT QA | PhoneGap |

Microsoft Certifications(25)
RPA |

DevOps Certifications(7)
Robotics | Apache Knox | Hadoop Security | Apache Oozie | AngularJS Packaging and Testing |

Certifications(28)
Angular 2 Building Blocks | Angular 8 | Angular Routes and Forms | Angular 2 Game of states | Routers and Custom Directives | Angular Oriana | Angular FAQ | ReactJS | JavaScript Questions | Redux state management | KnockoutJS | Backbone | JavaScript Quiz | React Native | Javascript Code | React MCQ | D3.JS | Aurelia MCQ | DevOpsSec | Devops Security |

Amazon Certification(17)
DevSecOps | DevOps Culture | DevOps Questions | Devops | UDP | Network Security | Networking Faq | Firewall | iOS Questions | SASS | CSS MCQ Quiz | CSS | SASS MCQ | Aptitude Quiz | Reasoning Quiz | Average Aptitude |

Authentication Authorization(27)
Number Quiz | Computer Quiz | Hardware |

Cisco Certifications(3)
Web Technology MCQ | Computer Science Quiz |

HashiCorp Exams(1)
Google BigQuery |

Devops(120)
FTP | SNMP MCQ |

Google Certifications(14)
SNMP | AH and ESP Protocols | Talend | JBoss | Business Analyst | OBIEE | Oracle Faq | Oracle Cloud | Hosting Faq | Microsoft Excel | MSWord | Microsoft Teams MCQ | Microsoft Word MCQ | Microsoft Graph | Threat Hunting | Threat Modeling | Azure Databases | Azure Data Factory |

GATE(1)
Exam AZ-104 | Azure Identity Management | Azure Virtual Networks | Azure Continuum |

PMI Certifications(13)
Azure MCQ | VSTS |

ServiceNow Exams(9)
Azure Virtual Machines |

Mechanical Engineering(90)
Azure | VBA in Excel |

Citrix Certification(1)
Pentaho BI | BI Questions | Power BI |

ETL(6)
Financial Management MCQ | REST Questions | GDS Questions | SSRS | Indian Laws | SSMS | Microsoft 98-369 | AZ-204 |

Apple Certification(8)
Excel 2013 |

Blockchain Certification(3)
MS-900 | Microsoft 98-375 | Microsoft 70-762 | AZ-104 | Microsoft 98-382 | SAFe Product Owner | SAFe Agilist | PSM II Scrum | SAFe 5 DevOps Practitioner | API 580 | Cybersecurity Fundamentals Specialist | Black Belt Certification | Six Sigma LSSYB | Six Sigma LSSGB | Tibco TB0-123 | ITIL 4 Foundation | ITIL Foundation | Six Sigma LSSWB | GCP Certification Dumps | API-571 | Google Analytics IQ | TDVCL1 | Scrum PSPO I Exam | Salesforce CRT-450 Exam | Agile SASM Certification | AWS Certified Developer Associate | AWS SysOps Certification | AWS Certified Cloud Practitioner | AWS DevOps Engineer | AWS SOA-C02 | GSuite | Associate Cloud Engineer | Google PCA Exam | Google PCE | Cloud Digital Leader | MAC-16A | Apple 9L0-012 Exam | Apple 9L0-066 Exam | Apple 9L0-422 | BlockChain CBBF | Blockchain CBSA | M2M Authorization |

Threat and vulnerability(45)
OAuth | Authentication |

Laws(5)
GATE FAQ | Cisco 200-901 | DEVASC (200-901) | PgMP | PMP | PMI-ACP Exam | PMI-RMP Dumps | Terraform Associate | ServiceNow CAD | ServiceNow CSA | SQL Articles | Docker Articles | Materials Strength | Machine Design | Workshop Technology | Automobile Engineering |

Articles(4)
1Y0-340 NetScaler |

 :) Most Visited Questions

Deep Learning Questions Answers
Below are the different Deep Leaning Questions and answer a More...


What is Gulpjs and some multiple choice questions on Gulp
Gulpjs is an open source whihc helps in building Javascript More...


Continuous Integration Questions Answers
Below are the 20 odd questions for CI or Continuous Integra More...


Derived relationships in Association Rule Mining are represented in the form of __________.
Derived relationships in Association Rule Mining are repres More...


Microservices Architecture Questions Answers
Below are the different questions on Microservices Architec More...

Top Searches:asp net questions vb net questions sql query uddl questions class javascript Questions sharepoint interview questions and concept silverlight questions and concept wcf questions beans general knowledge ajax questions
PHP | Biztalk | Testing | SAP | HR |