Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
Jenkins can be configured for monitoring external jobs such as CRON jobs:
asked
May 12, 2022
in
Continuous Integration with Jenkins
by
sharadyadav1986
jenkins-jobs
0
votes
1
answer
Which cryptography technique uses different keys to encrypt and decrypt?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
cryptography
encrypt
decrypt
0
votes
1
answer
Tcode for displaying clients:
asked
Apr 1, 2022
in
SAP S/4HANA Key Concepts Overview
by
Robindeniel
display-client-tcode
0
votes
1
answer
List some of the advantages of JavaScript.
asked
Jun 8, 2022
in
JavaScript
by
sharadyadav1986
javascipt-advantages
0
votes
1
answer
The maximum depth to which the alpha-beta pruning can be applied.
asked
May 15, 2022
in
Artificial Intelligence
by
SakshiSharma
ai-technique
0
votes
1
answer
Zabbix helps a user define threshold by means of __________.
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-therehold
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
1
answer
__________ components help in connecting one part of automation to another.
asked
Feb 12, 2022
in
RPA with Pega
by
Robindeniel
automation
pega
+1
vote
1
answer
What is the task of the Forward control when intercepting a Burp Suite request?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
forward-control
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
‘Copy artifacts’ is an option that is available for selection under the ___________.
asked
May 12, 2022
in
Continuous Integration with Jenkins
by
sharadyadav1986
copy-artifacts
0
votes
1
answer
What are the functions of Supervised Learning?
asked
May 8, 2022
in
Machine Learning
by
sharadyadav1986
supervised-learning
0
votes
1
answer
Which Objective C file can be used to switch the React Native bundle location in bundle.cc?
asked
May 20, 2020
in
ReactJS
by
GeorgeBell
#reactjs
#react-native
0
votes
1
answer
Which are the two components of Bayesian logic program?
asked
May 9, 2022
in
Machine Learning
by
sharadyadav1986
bayesian-logic-program
+2
votes
1
answer
Define the term deep learning
asked
May 30, 2022
in
Data Science
by
sharadyadav1986
deep-learning
0
votes
1
answer
What are the types of data binding modes in Xamarin?
asked
Jun 2, 2022
in
Xamarin Exordium
by
sharadyadav1986
data-binding
0
votes
1
answer
What Are The Various Data Types In Apache Presto?
asked
May 24, 2022
in
Apache Presto
by
Robin
presto-data-types
0
votes
1
answer
Photo diode is a an ____________ electronic component.
asked
Dec 15, 2021
in
Internet Of Things Prime
by
sharadyadav1986
photo-diode
0
votes
1
answer
Explain Exception Handling in Kotlin
asked
May 26, 2022
in
Kotlin
by
Robin
kotlin-exception-handling
0
votes
1
answer
Why Should We Use Apache Presto?
asked
May 24, 2022
in
Apache Presto
by
Robin
apache-presto-use
0
votes
1
answer
Zabbix macros are used in __________.
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-macros
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
1
answer
Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
rat
malware
security
Page:
« prev
1
...
825
826
827
828
829
830
831
832
833
834
835
...
1000
...
next »
...