Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
Which of the following is used to gather cyber threat intelligence and generate threat analysis report
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-hunt
0
votes
1
answer
What is Customer segmentation?
asked
Aug 27, 2022
in
Insurance
by
sharadyadav1986
customer-segmentation
insurance
0
votes
1
answer
Out of these methods of the Object class, which one can clone an object?
asked
Aug 21, 2022
in
JAVA
by
sharadyadav1986
object-class
java
method
0
votes
1
answer
What is the key in any design thinking process?
asked
May 4, 2022
in
Design Thinking Methodologies
by
sharadyadav1986
design-thinking-process
0
votes
1
answer
The __________ states that no significant difference exists between a set of variables.
asked
Apr 23, 2022
in
Statistics and Probability Basics
by
sharadyadav1986
pobability
0
votes
1
answer
Name an evaluation technique to assess the quality of test cases.
asked
Aug 23, 2022
in
Software Defined Networking
by
Robin
evaluation-technology
software-engineering
+3
votes
1
answer
A team finishes developing all of their Stories in the first six days of the Iteration, tests them in the following two days, and fixes bugs in the days remaining. How is the team behaving?
asked
Jun 17, 2019
in
Agile
by
tempuser123
#safe-agile
+1
vote
1
answer
Which among the following is valid with respect to ether? S1: Ether is should be contained in any particular machine or application S2: Ether can be accessed from another node if private key is known
asked
Jun 14, 2022
in
BlockChain
by
rajeshsharma
ether
0
votes
1
answer
Which of the following will not yield in declaring x as the datatype of float?
asked
Jun 24, 2020
in
Python
by
Robindeniel
#python-code
#code-python
Python-questions-answers
0
votes
1
answer
Once the ________ is posted in the system, all financial documents are updated.
asked
Apr 4, 2022
in
SAP S/4HANA ‘Procure to Pay’
by
sharadyadav1986
sap-invoice
+1
vote
1
answer
What does Redis use to sort the elements of a sorted set?
asked
Aug 14, 2022
in
NoSQL
by
AdilsonLima
nosql
0
votes
1
answer
The structure of the database tables is known as the ‘Database model’.
asked
Apr 3, 2022
in
SAP S/4HANA Architecture and Data Model
by
sharadyadav1986
sap-database-structure
+1
vote
1
answer
Which of the following function is used to set cookie in PHP?
asked
May 13, 2022
in
PHP
by
john ganales
cookies
+1
vote
1
answer
What is a Google Penalty?
asked
Aug 17, 2022
in
SEO
by
rajeshsharma
google-penalty
seo
search
0
votes
1
answer
How are the chat conversations arranged in Teams?
asked
Jun 27, 2022
in
Microsoft Teams
by
SakshiSharma
ms-teams
0
votes
1
answer
When you convert a map to a list using the toList method of the map, the result will be of which type?
asked
Aug 13, 2022
in
Scala - The Diatonic Syallable
by
AdilsonLima
scala
+3
votes
1
answer
What is the role of the System Architect/Engineer?
asked
Jul 29, 2019
in
Agile
by
sheetalkhandelwal
#agile-development-methodology
#agile-training
#agile-software
#agile-process
#agile-vs-scrum
#agile-methodologies
#scaled-agile-framework
#safe-agile
#agile
definition
+1
vote
1
answer
Which of the following statement is true about $dirty flag?
asked
Jul 5, 2022
in
Angular
by
sharadyadav1986
angular
0
votes
1
answer
Name different techniques used in off-page SEO?
asked
Aug 8, 2022
in
SEO
by
Robin
seo
techniques
0
votes
0
answers
What is one way to implement pattern matching on methods?
asked
Aug 13, 2022
in
Scala Constructs
by
AdilsonLima
scala
Page:
« prev
1
...
738
739
740
741
742
743
744
745
746
747
748
...
1000
...
next »
...