Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
Which of the following are the advantages of threat modeling?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
advantage-threat-modeling
threat-modeling-advantages
0
votes
What does “Timeboxed” means in Agile terms?
asked
Apr 21, 2021
in
Agile
by
rajeshsharma
agile
planning
agile-mcq
agile-mcq-2021
agile-interview-questions
agile-questions-answers
0
votes
What are the ways to trigger a Jenkins Job/Pipeline?
asked
Nov 16, 2022
in
Jenkins
by
Robin
jenkins-jobs
jenkins-pipeline
0
votes
What is the difference between Search Head Pooling and Search Head Clustering?
asked
Nov 23, 2022
in
DevOps Culture
by
john ganales
splunk
seach-head
clustering-splunk
0
votes
How do I fix a fortify scan error?
asked
Nov 29, 2022
in
Fortify code scanner
by
john ganales
fortify-scan-error
0
votes
What other types of collaboration tools are available as part of Google Workspaces?
asked
Nov 14, 2022
in
Google Workspace
by
SakshiSharma
google-workspace
0
votes
Does Google offer any discounts for educational institutions?
asked
Nov 14, 2022
in
Google Workspace
by
SakshiSharma
google-workspace
+4
votes
Which of the following is a widely used and effective machine learning algorithm based on the idea of bagging?
asked
Oct 26, 2022
in
Machine Learning
by
Robin
machine-learning
0
votes
William sent an E-mail message to an employee recently assigned to his team complimenting her on her dress. Later she was reprimanded for poor
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
using transient code, _______ the size of the operating system during program execution.
asked
Nov 13, 2022
in
Operating System
by
john ganales
transient-code
operating-system
0
votes
What modes can Hadoop code be run in?
asked
Oct 29, 2022
in
Hadoop
by
SakshiSharma
hadoop
modes
0
votes
How Jenkins knows when to execute a Scheduled job/pipeline and how it is triggered?
asked
Nov 16, 2022
in
Jenkins
by
Robin
jenkins
executable-jobs
0
votes
In scrum the team activity is monitored and coordinated on ......... basis.
asked
Mar 19, 2020
in
Agile
by
DavidAnderson
#scum
#scrum-team
#team-activity
0
votes
Reduced data footprint and faster throughput is one of the many benefits of SAP S/4HANA.
asked
Apr 5, 2022
in
SAP S/4HANA Awareness 1909
by
sharadyadav1986
sap-hana
0
votes
It is unlawful, and a violation of the company’s policy, to retaliate against someone who resists unwelcome behavior, files a complaint about harassment or perceived harassment, or participates in an investigation.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
+2
votes
Explain Workflow Actions in Splunk?
asked
Nov 24, 2022
in
DevOps Culture
by
Robin
splunk
action-workflow
0
votes
What is the procedure for revoking a private access token?
asked
Nov 20, 2022
in
Azure Databricks
by
Robin
private-access-token
0
votes
Which of the following format is supported by monitoring in Jaeger?
asked
Nov 10, 2022
in
Zipkin-Jaeger
by
Robin
zipkin
jaeger
0
votes
What are the ways to install Jenkins?
asked
Nov 16, 2022
in
Jenkins
by
Robin
jenkins-install
installation-jenkins
0
votes
WeaveNet uses this protocol to route packets among peers.
asked
Nov 9, 2022
in
Weaveworks
by
Robindeniel
weavenet
weaveworks
Page:
« prev
1
...
591
592
593
594
595
596
597
598
599
600
601
...
1000
next »
...