Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
+1
vote
A Persona used within an Agile user story can he thought of as:
asked
Apr 20, 2021
in
Agile
by
rajeshsharma
agile
planning
agile-mcq
agile-mcq-2021
agile-interview-questions
agile-questions-answers
0
votes
Why, in your opinion, should teams have direct exposure to actionable information about the products and services they offer?
asked
Dec 25, 2022
in
Data Analytics
by
sharadyadav1986
dynatrace
0
votes
What is WSGI?
asked
Dec 23, 2022
in
Python Flask
by
john ganales
flask
wsgi
0
votes
If a DataNode is marked as decommissioned, can it be chosen for replica placement?
asked
Dec 21, 2022
in
HDFS
by
Robin
replica-placement
hdfs-datanode
0
votes
Compare Sqoop and Flume
asked
Dec 22, 2022
in
Sqoop
by
SakshiSharma
sqoop
flume
0
votes
The Web services protocol for creating and sharing security context:
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-protocol
+1
vote
Which would not happen during the hands-on part of an interview?
asked
Dec 15, 2022
in
Agile
by
Robin
hands-on-interview
+1
vote
Which trait is not possessed by a professional that creates a hospitality experience?
asked
Dec 15, 2022
in
Agile
by
Robin
agile
0
votes
Which Gestalt law states that the human brain prefers to see a continuous flow of design elements and not as separate objects?
asked
Feb 22, 2022
in
Novice Guide to Visual Design
by
sharadyadav1986
gestalt-state-law
element-design
design-elements
0
votes
You are using the Set-AzureRMVMSourceImage command with the -Version parameter. You want to ensure you get the most current image. Which value should you use with the -Version parameter?
asked
Sep 28, 2021
in
Azure Essentials
by
Robin
set-azurermvmsourceimage
0
votes
The testing approach that is more useful for protection against internal attacks is __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
testing-approach
protection
internal-attacks
0
votes
If there are 10 HDFS blocks to be copied from one machine to another. However, the other machine can copy only 7.5 blocks, is there a possibility for the blocks to be broken down during the time of replication?
asked
Dec 20, 2022
in
Hadoop
by
john ganales
hadoop
+3
votes
____________ learning aids in uncovering hidden patterns from unlabeled data.
asked
Feb 6, 2020
in
Artificial Intelligence
by
GeorgeBell
supervised-learning
unsupervised-learning
0
votes
You use __________ to organize resources in an Azure subscription.
asked
Dec 19, 2022
in
Azure
by
Robin
azure-subscription
0
votes
Which layer provides the services to user?
asked
Dec 10, 2022
in
Network Theory
by
SakshiSharma
network-layer
0
votes
Intercept can be used to change a request body.
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
The physical layer provides __________.
asked
Dec 4, 2022
in
IOT Prime
by
SakshiSharma
physical-layer
0
votes
How to install a Custom Jenkins Plugin or a Version of Plugin Not available in Jenkins Update Center?
asked
Dec 10, 2022
in
Jenkins
by
SakshiSharma
jenkins-plugins
0
votes
The Scrum framework, being an Agile iterative process, inherently minimizes risk. Many Scrum practices facilitate effective management of risk.
asked
Dec 16, 2022
in
Agile
by
rajeshsharma
scrum-framework
0
votes
Any node is the path from the root to the node is called
asked
Dec 8, 2022
in
Data Structures & Algorithms
by
sharadyadav1986
tree-node
Page:
« prev
1
...
559
560
561
562
563
564
565
566
567
568
569
...
1000
next »
...