Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
Which of the following actions compromise cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security-actions
0
votes
Define business parameters in Tosca?
asked
Aug 24, 2022
in
TOSCA
by
john ganales
business-parameter
tosca
tosca-interview-questions
tosca-automation-specialist
0
votes
A security group is a _____ on the _____ level.
asked
Sep 6, 2022
in
AWS
by
sharadyadav1986
aws
security-group
vpc
0
votes
It is possible to change the variables defined using __ keyword as many times as you like.
asked
Sep 11, 2022
in
Scala Constructs
by
sharadyadav1986
scala
variables
code
0
votes
Which of the following are scala variables?
asked
Sep 11, 2022
in
Scala Constructs
by
sharadyadav1986
scala
variables
0
votes
What is the use of self in Python?
asked
Sep 9, 2022
in
Python
by
john ganales
python
self
0
votes
Write different types of scope provided for variables in Scala.
asked
Sep 10, 2022
in
Scala Constructs
by
Robin
scala
variables-scope
0
votes
What are the standard converters in JSF (JavaServer Faces)?
asked
Sep 14, 2022
in
JSF
by
sharadyadav1986
standard-converter
jsf
0
votes
Similar to Linux OS, DC/OS has both system space (aka kernel space) and user space
asked
Sep 17, 2022
in
DC-OS
by
Robin
dc-os
linux-os
distributed-cloud-operating-system
0
votes
The structure for general ledger accounting, accounts payable, receivables, asset accounting, all financial transactions, cost control, and profitability analysis is __.
asked
Apr 3, 2022
in
SAP S/4HANA Enterprise Structure
by
sharadyadav1986
sap-account
0
votes
According to AWS, what is the benefit of Elasticity?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
cloud
0
votes
What are modules and packages in Python?
asked
Sep 9, 2022
in
Python
by
john ganales
python
modules
0
votes
What are different types of constructors used in Scala?
asked
Sep 11, 2022
in
Scala Constructs
by
sharadyadav1986
scala
constructors
0
votes
AWS works on a _____ pricing model.
asked
Sep 5, 2022
in
AWS
by
sharadyadav1986
aws
cloud
0
votes
Which of the following is a type of cyber attack?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-attack
0
votes
What can you do to improve S3 Performance for Downloads?
asked
Sep 6, 2022
in
AWS
by
sharadyadav1986
s3-performance
download
aws
0
votes
The transformation which produces one output value for each input value and the operation which produces an arbitrary number values for each input value.
asked
Sep 16, 2022
in
Spark Preliminaries
by
kamalkhandelwal29
spark-transformation
spark-preliminaries
0
votes
Down sampling is the process of converting a ______________ to __________________ frequency.
asked
Sep 19, 2022
in
Time Series Analysis
by
Robin
time-series
time-analysis
0
votes
Explain the different access modifiers that are available in Scala.
asked
Sep 11, 2022
in
Scala Constructs
by
sharadyadav1986
scala
access-modifiers
+1
vote
What do Dummies do?
asked
Sep 26, 2022
in
Machine Learning
by
Robin
dummies
machine-learning
Page:
« prev
1
...
668
669
670
671
672
673
674
675
676
677
678
...
1000
next »
...