Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
Which of the following is an attack against confidentiality?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
What is “Penetration Testing”?
asked
Nov 29, 2022
in
Fortify code scanner
by
john ganales
penetration-testing
+1
vote
Which of the following intruder attack uses single payload sets?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intruder-attack
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
__________ enables you to scale to thousands of virtual machines for high-performance computing and large-scale parallel jobs.
asked
Dec 19, 2022
in
Azure
by
Robin
azure
virtual-machine
0
votes
A …………… is an acyclic digraph, which has only one node with indegree 0, and other nodes have in-degree 1.
asked
Dec 8, 2022
in
Data Structures & Algorithms
by
sharadyadav1986
acycalic-graph
0
votes
Which of the following is a data link protocol?
asked
Dec 3, 2022
in
IOT Prime
by
Robin
data-link-protocol
0
votes
Who created Flask?
asked
Dec 23, 2022
in
Python Flask
by
john ganales
flask
developer-flask
0
votes
Peter is a Scrum Master on a software development project for a premier chain of hospitals
asked
Dec 16, 2022
in
Agile
by
rajeshsharma
scrum-master
0
votes
A part of UDDI that acts as an interface between Web service applications.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
uddi
web-service
+4
votes
What characterize is hyperplance in geometrical model of machine learning?
asked
Dec 6, 2022
in
Machine Learning
by
sharadyadav1986
machine-learning
0
votes
Herder node is used as sentinel in …..
asked
Dec 8, 2022
in
Data Structures & Algorithms
by
Robin
data-structue
+1
vote
This set of related data items is known as a
asked
Dec 4, 2022
in
DBMS
by
SakshiSharma
record-data
dbms
0
votes
Identify the data structure which allows deletions at both ends of the list but insertion at only one end.
asked
Dec 8, 2022
in
Data Structures & Algorithms
by
Robin
data-structure
0
votes
Which of the following IS NOT a readability metric?
asked
Feb 23, 2022
in
Interaction Design
by
sharadyadav1986
readability-metric
interaction-design
0
votes
How to change default host and port in Flask?
asked
Dec 23, 2022
in
Python Flask
by
john ganales
python-flask
flask-port
0
votes
In a project, percentage compliance to SLAs metric is affected by factors like inflow of tickets
asked
Dec 17, 2022
in
Data Analytics
by
AdilsonLima
data-analytics
0
votes
What is “SQL Injection”?
asked
Nov 29, 2022
in
Fortify code scanner
by
john ganales
sql-injection
0
votes
When collection of various computers seems a single coherent system to its client, then it is called
asked
Dec 9, 2022
in
Network Theory
by
Robin
network
0
votes
I have a file “Sample” on HDFS. How can I copy this file to the local file system?
asked
Dec 21, 2022
in
HDFS
by
Robin
hdfs0files
0
votes
Select all that apply. Employee master includes ___________.
asked
Mar 25, 2022
in
SAP S/4HANA Master Data Concepts
by
sharadyadav1986
sap-employee-master
Page:
« prev
1
...
577
578
579
580
581
582
583
584
585
586
587
...
1000
next »
...