Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
What is Classification?
asked
Jul 6, 2022
in
Data Mining Methods Basics
by
sharadyadav1986
classification
data-mining
0
votes
1
answer
Does the Experience of the team play an essential role in the Design Thinking process
asked
Feb 24, 2022
in
Implementing Design Thinking
by
sharadyadav1986
user-experience
design-thinking-process
0
votes
1
answer
If you wanted to process a stream of names, extract the male names, and store them in a new list, what is the appropriate operation to be used?
asked
Jun 30, 2022
in
JAVA
by
sharadyadav1986
java8
java
0
votes
1
answer
What does the _all field do?
asked
Jul 9, 2022
in
ElasticSearch
by
sharadyadav1986
elasticsearch
+1
vote
1
answer
All Nodes are initially in the follower state.
asked
Jun 21, 2022
in
Consul
by
john ganales
consul
nodes
0
votes
1
answer
What is the name of the logo file in Apigee developer portal.
asked
Jun 20, 2022
in
APIGEE - API Services
by
sharadyadav1986
apigee
+1
vote
1
answer
Explain the method to add a mapping in an Index
asked
Jul 11, 2022
in
ElasticSearch
by
sharadyadav1986
add-mapping
index
elasticsearch
0
votes
1
answer
A document is a/an ________.
asked
Jul 7, 2022
in
ElasticSearch
by
sharadyadav1986
elasticsearch
0
votes
1
answer
What are the various ways of using X-Pack Commands?
asked
Jul 11, 2022
in
ElasticSearch
by
sharadyadav1986
x-pack
0
votes
1
answer
Both input parameter and output can be found in developer portal.
asked
Jun 20, 2022
in
APIGEE - API Services
by
sharadyadav1986
apigee
0
votes
1
answer
SAP has defined ISO standard settings for all company codes.
asked
Apr 1, 2022
in
SAP S/4HANA Key Concepts Overview
by
Robindeniel
sap-standard
0
votes
1
answer
Which among the following can be done in public and private Ethereum chains? S1: Send and receive ether S2: Write smart contracts S3: Launch your own token based on ether
asked
Jun 13, 2022
in
BlockChain
by
Robindeniel
ethereum-chains
0
votes
1
answer
What are the various commands available in Elasticsearch cat API?
asked
Jul 11, 2022
in
ElasticSearch
by
sharadyadav1986
cat-api
elasticsearch
0
votes
1
answer
What is an attack that exploits the trust a site has in a user’s browser?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
user-browser
0
votes
1
answer
Which among the following network can be created by users?
asked
Jul 1, 2022
in
Docker
by
sharadyadav1986
docker
0
votes
1
answer
User defined standard layouts begin with ___________.
asked
Mar 31, 2022
in
SAP S/4HANA Reporting and Analytics
by
Robindeniel
sap-user-standards
sap-s
4hana-reporting-and-analytics
basic-configurations-sap
embedded-analytics-s4hana
sap-analytics
sap-analytical-reporting
multidimensional-reporting
analytics-architecture-sap
sap-reporting
0
votes
1
answer
State True or False: Procurement analytics is a process of using quantitative methods to derive actionable insights from the data.
asked
Apr 4, 2022
in
SAP S/4HANA ‘Procure to Pay’
by
sharadyadav1986
procurement-analysis
0
votes
1
answer
What happens when you press Cntrl+P+Q inside the container?
asked
Jul 1, 2022
in
Docker
by
sharadyadav1986
docker
0
votes
1
answer
_________ is a web-based tool for administration, monitoring, and maintenance of SAP HANA systems.
asked
Mar 24, 2022
in
SAP S/4HANA Technical Capabilities 1909
by
sharadyadav1986
sap-tool
sap-s4hana-technical-capabilities-1909
sap-s4hana-technical-capabilities-2020
sap-hana-version
sap-hana-data-model
sap-hana-solution
sap-hana-questions-answers
s4hana-awareness-questions-answers
s4hana-fresco-play-questions
0
votes
1
answer
Standard tokenizer implements __________.
asked
Jul 9, 2022
in
ElasticSearch
by
sharadyadav1986
elasticsearch
Page:
« prev
1
...
769
770
771
772
773
774
775
776
777
778
779
...
1000
...
next »
...