Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
+1
vote
What are slots?
asked
Feb 3, 2023
in
VueJS
by
john ganales
vuejs
slots
0
votes
What are the common problems in the software development process?
asked
Jan 23, 2023
in
TestLink
by
sharadyadav1986
common-problemsn
0
votes
As a QA tester, who will you report or submit your test cases?
asked
Jan 23, 2023
in
TestLink
by
sharadyadav1986
test-cases
testlink
+1
vote
Why should I use a graph database?
asked
Jan 27, 2023
in
Neo4j
by
sharadyadav1986
neo4j
+1
vote
Where is the graph database used?
asked
Jan 27, 2023
in
Neo4j
by
sharadyadav1986
neo4j-database
0
votes
Is Neo4j scalable?
asked
Jan 28, 2023
in
Neo4j
by
john ganales
neo4j-scale
0
votes
Tables related to _______ are simplified in SAP S/4HANA.
asked
Mar 24, 2022
in
SAP S/4HANA Technical Capabilities 1909
by
sharadyadav1986
sap-tables
sap-s4hana-technical-capabilities-1909
sap-s4hana-technical-capabilities-2020
sap-hana-version
sap-hana-data-model
sap-hana-solution
sap-hana-questions-answers
s4hana-awareness-questions-answers
s4hana-fresco-play-questions
+1
vote
How to protect data in transit Vs rest?
asked
Jan 19, 2023
in
Cyber Security
by
Robindeniel
transit-vs-rest
+2
votes
If A Bug Has High Severity Then Usually That Is Treated As High Priority, Then Why Do Priority Given By Test Engineers/project Managers And Severity Given By Testers?
asked
Jan 21, 2023
in
TestLink
by
Robindeniel
testing
testlink
+1
vote
What is cognitive security?
asked
Jan 19, 2023
in
Cyber Security
by
Robindeniel
cognitive-security
0
votes
Which of the following option is not considered by the Interface design?
asked
Jan 8, 2023
in
Usability Principles
by
SakshiSharma
interface-design
+1
vote
What is the CALCULATE function in DAX?
asked
Jan 16, 2023
in
PowerBI
by
Robin
dax-calculate
+1
vote
Explain System hardening?
asked
Jan 19, 2023
in
Cyber Security
by
Robindeniel
system-hardening
0
votes
You are designing a distributed application for Azure. The application must securely integrate with on-premises servers.
asked
Sep 28, 2021
in
Azure Essentials
by
Robin
azure-application
+1
vote
What are the common methods of authentication for network security?
asked
Jan 19, 2023
in
Cyber Security
by
Robindeniel
cyber-security
+1
vote
What is the difference between final and finally in Java?
asked
Feb 1, 2023
in
JAVA
by
sharadyadav1986
final-keyword
finally-keyword
+1
vote
Why should you apply general formatting to Power BI data?
asked
Jan 16, 2023
in
PowerBI
by
Robin
powerbi-data
0
votes
. ................. operator is used to view the map reduce execution plans.
asked
Jan 13, 2023
in
Hadoop
by
john ganales
hadoop
+1
vote
What are the categories of data types?
asked
Jan 16, 2023
in
PowerBI
by
Robin
powerbi
data-types
0
votes
A network of infected systems under the control of a hacker, whose intention is to damage other computer networks by making them unavailable is called __________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
infected-system
hacker-control
Page:
« prev
1
...
522
523
524
525
526
527
528
529
530
531
532
...
1000
next »
...