Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
Which method is used to check for prefix in Swift?
asked
Nov 6, 2022
in
Swift
by
rajeshsharma
swift
0
votes
_________ component is used to display a non-editable text.
asked
Nov 4, 2022
in
Vaadin Unplugged
by
sharadyadav1986
non-editable-text
vaadin
0
votes
Single line diagram of which of the following power system is possible?
asked
Nov 11, 2022
in
Power System
by
Robin
power-system
0
votes
Can you tell me some good coding practices while automation?
asked
Nov 17, 2022
in
Testing
by
sharadyadav1986
automation-testing
code-practices
0
votes
You can run multiple OS using ________.
asked
Oct 25, 2022
in
Service Deployment Concepts
by
AdilsonLima
service-deployment-questions-answers
0
votes
For a given power system, its zero and maximum regulation will occur at the impedance angle of
asked
Nov 11, 2022
in
Power System
by
Robin
power-system
0
votes
The following are LocalStorage functions, except ________
asked
Feb 11, 2020
in
HTML
by
rahuljain1
#html-functions
0
votes
This command is used to view flux logs.
asked
Nov 9, 2022
in
Weaveworks
by
Robindeniel
flux-logs
weaveworks
0
votes
Cascading termination refers to the termination of all child processes if the parent process terminates ______.
asked
Nov 12, 2022
in
Operating System
by
john ganales
cascading-termination
operating-system
0
votes
Choose all correct statements. S1: Swift was developed by Apple Inc S2: Swift has file name extension as .swift S3: Swift is an alternative to the Objective-C language
asked
Nov 6, 2022
in
Swift
by
rajeshsharma
swift
0
votes
WeaveWorks uses this as a Single Source Of Truth.
asked
Nov 9, 2022
in
Weaveworks
by
Robindeniel
weaveworks
0
votes
Which of the following file is updated in a Linux machine to enable SELinux?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
0
votes
OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
owasp
zed-attack-proxy
containers
security
0
votes
How to add an element into an Array?
asked
Nov 7, 2022
in
Swift
by
Robin
element-array
element-add
0
votes
Sexual harrassment is not limited to physical contact. It can occur any time that an individual is uncomfortable with another person’s approaches, comments or discussions.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
The _________ presents a uniform device-access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system.
asked
Nov 13, 2022
in
Operating System
by
john ganales
device-drivers
operating-system
0
votes
Which SAP applications are considered as Line of Business (LoB) product related to S/4HANA Sales:
asked
Mar 25, 2022
in
SAP S/4HANA Functional Capabilities 1909
by
sharadyadav1986
sap-applications
line-of-business
0
votes
The portion of the process scheduler in an operating system that dispatches processes is concerned with ____________.
asked
Nov 12, 2022
in
Operating System
by
john ganales
operating-system
0
votes
What is keyword stemming and why does it matter?
asked
Nov 2, 2022
in
SEO
by
john ganales
keyword-streaming
0
votes
Sexual harassment complaints are generally false or unjustified.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
Page:
« prev
1
...
602
603
604
605
606
607
608
609
610
611
612
...
1000
next »
...