Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
Which rule is applied for the Simple reflex agent?
asked
May 14, 2022
in
Artificial Intelligence
by
Robin
reflex-agent
+1
vote
Which of the following starts with __ (double underscore) in PHP?
asked
May 11, 2022
in
PHP
by
sharadyadav1986
php-constant
0
votes
What Are The Config Properties Of Apache Presto?
asked
May 24, 2022
in
Apache Presto
by
Robin
presto-config
0
votes
What are the Data sources for the Power BI?
asked
May 25, 2022
in
PowerBI
by
Robin
power-bi-data-source
0
votes
The number of Common Phases of SAP Activate Methodology is __________.
asked
Mar 19, 2022
in
SAP S/4HANA Project Management
by
sharadyadav1986
sap-activate-methodology
sap-phases
0
votes
COGS Split happens in only with MTS scenario.
asked
Apr 11, 2022
in
SAP S/4HANA Finance demos
by
rajeshsharma
cogs
mts-scenario
0
votes
Which are the two components of Bayesian logic program?
asked
May 9, 2022
in
Machine Learning
by
sharadyadav1986
bayesian-logic-program
0
votes
Zabbix macros are used in __________.
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-macros
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
‘Archiving the artifacts’ is an option that is present for selection under the _________.
asked
May 12, 2022
in
Continuous Integration with Jenkins
by
sharadyadav1986
jenkins-artifacts
0
votes
The _________ process is where materials are manufactured based on anticipated customer demand.
asked
Apr 8, 2022
in
SAP S/4HANA 'Forecast to Stock’
by
sharadyadav1986
sap-process
0
votes
Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
rat
malware
security
0
votes
Which cryptography technique uses different keys to encrypt and decrypt?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
cryptography
encrypt
decrypt
0
votes
‘Copy artifacts’ is an option that is available for selection under the ___________.
asked
May 12, 2022
in
Continuous Integration with Jenkins
by
sharadyadav1986
copy-artifacts
0
votes
What is a ClassLoader?
asked
Jun 1, 2022
in
JAVA
by
SakshiSharma
classloader
0
votes
The report painter is based on the principle of ____________.
asked
Mar 31, 2022
in
SAP S/4HANA Reporting and Analytics
by
Robindeniel
report-painter
sap-s
4hana-reporting-and-analytics
basic-configurations-sap
embedded-analytics-s4hana
sap-analytics
sap-analytical-reporting
multidimensional-reporting
analytics-architecture-sap
sap-reporting
0
votes
What are the Types of Power BI tools?
asked
May 25, 2022
in
PowerBI
by
Robin
power-bi-tools
0
votes
________ is the next generation solution of SAP BW.
asked
Mar 31, 2022
in
SAP S/4HANA Reporting and Analytics
by
Robindeniel
sap-bw
sap-s
4hana-reporting-and-analytics
basic-configurations-sap
embedded-analytics-s4hana
sap-analytics
sap-analytical-reporting
multidimensional-reporting
analytics-architecture-sap
sap-reporting
0
votes
What are some powerful features integrated into Angular?
asked
Jun 4, 2022
in
Angular
by
sharadyadav1986
angular-features
0
votes
Explain History of Power BI?
asked
May 25, 2022
in
PowerBI
by
Robin
powerbi-history
0
votes
The probability of committing a Type 1 error is called __________.
asked
Apr 23, 2022
in
Statistics and Probability Basics
by
sharadyadav1986
probability
Page:
« prev
1
...
808
809
810
811
812
813
814
815
816
817
818
...
1000
next »
...