Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
Which of the following statements is true about SQLite indexes?
asked
Jun 9
in
Sql
by
rajeshsharma
sqlite
indexes
0
votes
Which pillar of the AWS Well-Architected Framework focuses on maintaining computing efficiency using serverless architectures?
asked
Jun 6
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
An architect is designing a solution. Appropriate data classification is being implemented by classifying the data sensitivity levels. The solution needs to consider the encryption of data and tokenization. Which of the design principles for security in the cloud is the architect applying?
asked
Jun 9
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
To access data stored in Amazon S3 bucket from on-premise locations using AWS Direct Connect, which of the following interface & routing protocols require to be configured?
asked
Jun 9
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
In the shared responsibility model for infrastructure services, such as Amazon Elastic Compute Cloud, which of the below two are customers responsibility?
asked
Jun 9
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
The developers in the operations department want to use an IDE to run, test and debug code for Lambda functions.
asked
Jun 6
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
Which of the below is NOT a benefit of moving to the cloud?
asked
Jun 9
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
Important functions of your production application are degraded. The support engineer has an AWS account with a Business-level AWS Support plan.
asked
Jun 9
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
Which of the following accurately describes a typical use case in which the AWS CodePipeline service can be utilized?
asked
Jun 6
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
An administrator needs to manage many AWS accounts within a big organization. Which of the following is the most appropriate AWS service for an administrator to utilize?
asked
Jun 6
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
An e-learning start-up providing school students with practice tests needs to run an application during the holiday season (2 months).
asked
Jun 9
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
Which of the following tools can be used to check service limits for resources launched within AWS Cloud Infrastructure?
asked
Jun 6
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
Which of the AWS service helps you to set reservation utilization and trigger alerts when utilization drops below the defined threshold?
asked
Jun 9
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
A group of non-tech savvy friends are looking to set up a website for an upcoming event at a cost-effective price, with a novice-friendly interface.
asked
Jun 6
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
Based on the AWS Well-Architected Framework, how should a start-up company with a dynamic AWS environment manage its users and resources securely without affecting the cost?
asked
Jun 6
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
User personas are created during this phase.
asked
May 4, 2022
in
Design Thinking Methodologies
by
sharadyadav1986
design-thinking
0
votes
__________________ automates the discovery of sensitive data at scale and lowers the cost of protecting your data using machine learning and pattern matching techniques.
asked
Jun 5
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
Which of the following statements is true about SQLite triggers?
asked
Jun 5
in
Sql
by
SakshiSharma
sqlite
triggers
0
votes
Harmful programs utilized to disrupt computer operation, collect sensitive information or get access to private computer systems are generally known as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
harmful-programs
private-computer
0
votes
Which of the following is true about SQLite data types?
asked
Jun 5
in
Sql
by
SakshiSharma
sqlite
data
types
Page:
« prev
1
...
74
75
76
77
78
79
80
81
82
83
84
...
1000
next »
...