Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
Triggers are evaluated based on __________.
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-tigger
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
1
answer
Give the use of controller.
asked
May 21, 2022
in
AngularJS Packaging and Testing
by
sharadyadav1986
angular-controller
0
votes
1
answer
PWS has the below default app domain as_______.
asked
Feb 9, 2022
in
Cloud Foundry
by
GeorgeBell
cloud-foundry
0
votes
1
answer
Zabbix allows dependencies between hosts.
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-dependencies
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
1
answer
________ navigation allows the users to access items that they don’t need on a regular basis.
asked
Apr 20, 2022
in
Elements of User Experience
by
sharadyadav1986
element-navigation
0
votes
1
answer
What is Regularization? What kind of problems does regularization solve?
asked
May 9, 2022
in
Machine Learning
by
sharadyadav1986
regularization
0
votes
1
answer
What Is Jmx Connector?
asked
May 24, 2022
in
Apache Presto
by
Robin
jmx-connector
0
votes
1
answer
Which of the following ticket is sent by the authentication server to the client?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
authentication
0
votes
1
answer
What is Cognos?
asked
May 27, 2022
in
Cognos
by
john ganales
cognos
+1
vote
1
answer
Which of the following starts with __ (double underscore) in PHP?
asked
May 11, 2022
in
PHP
by
sharadyadav1986
php-constant
0
votes
1
answer
Photo diode is a an ____________ electronic component.
asked
Dec 15, 2021
in
Internet Of Things Prime
by
sharadyadav1986
photo-diode
0
votes
1
answer
What are the types of transport request?
asked
Apr 1, 2022
in
SAP S/4HANA Key Concepts Overview
by
Robindeniel
transport-request-types
0
votes
1
answer
Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
rat
malware
security
0
votes
1
answer
What are the Key terms used in Power BI?
asked
May 25, 2022
in
PowerBI
by
Robin
powerbi-key-terms
0
votes
1
answer
Explain Collections in Kotlin?
asked
May 26, 2022
in
Kotlin
by
Robin
kotlin-collections
0
votes
1
answer
Network BI is enabled by _____________.
asked
Feb 14, 2022
in
Birst
by
rajeshsharma
network-bi
0
votes
1
answer
How to write normal text code using JavaScript dynamically?
asked
Jun 9, 2022
in
JavaScript
by
sharadyadav1986
text-javascript
text-code
javascript
0
votes
1
answer
Who developed JavaScript, and what was the first name of JavaScript?
asked
Jun 8, 2022
in
JavaScript
by
sharadyadav1986
javascript-developer
+1
vote
1
answer
Name three disadvantages of using a linear model
asked
May 30, 2022
in
Data Science
by
sharadyadav1986
linear-model
0
votes
1
answer
What is the difference between undefined value and null value?
asked
Jun 9, 2022
in
JavaScript
by
sharadyadav1986
undefined-values
null-value
Page:
« prev
1
...
818
819
820
821
822
823
824
825
826
827
828
...
1000
...
next »
...