Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
Which is used to reveal the configuration of the plugin in ActiveMQ?
asked
May 1, 2022
in
Apache ActiveMQ
by
sharadyadav1986
activemq-configuration
0
votes
What is the account type that needs to be selected while creating an azure data lake storage gen 2 instance?
asked
Jan 31, 2022
in
Azure Data Lake Storage
by
sharadyadav1986
account-type
0
votes
The size of the queue and the number of flight messages is controlled by ___________.
asked
May 1, 2022
in
Apache ActiveMQ
by
sharadyadav1986
flight-messages
+1
vote
Aurora can have upto ________ low-latency replicas in ________ AZs.
asked
Feb 1, 2022
in
Amazon Database
by
sharadyadav1986
auroradb-latency
0
votes
explain numpy.concatenate() in Python
asked
May 19, 2022
in
Python
by
john ganales
numpy-concatenate
0
votes
Describe Synchronous and Asynchronous request in AJAX?
asked
May 15, 2022
in
AJAX
by
Robin
ajax-synchronous
ajax-asynchronous
0
votes
Identify the correct sequence of steps in a native app development.
asked
Dec 17, 2021
in
Hybrid Apps
by
sharadyadav1986
native-app-development
0
votes
A __ is a container of function modules
asked
Apr 24, 2022
in
SAP ABAP
by
sharadyadav1986
function-modules
0
votes
Smart Contracts in R3 Corda are written using programming languages like ______ and _____.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
What is AJAX?
asked
May 15, 2022
in
AJAX
by
Robin
ajax
0
votes
Where can you see the use of Joomla frequently?
asked
Apr 27, 2022
in
Joomla
by
sharadyadav1986
joomla-uses
+1
vote
How does Machine Learning differ from Deep Learning?
asked
May 7, 2022
in
Machine Learning
by
sharadyadav1986
machine-learning
0
votes
Adding black to an original color will give you a ______
asked
Apr 19, 2022
in
Color Theory
by
sharadyadav1986
color-theory
0
votes
Which one of the following systems cannot be considered as an example of the operating systems?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
operating-system
0
votes
Why instance-based learning algorithm sometimes referred to as Lazy learning algorithm?
asked
May 9, 2022
in
Machine Learning
by
sharadyadav1986
instance-based-learning
0
votes
Which of the following is not an objective of Kerberos?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
kerberos-objective
0
votes
explain numpy.column_stack() in Python
asked
May 19, 2022
in
Python
by
john ganales
numpy-column-stack
0
votes
explain numpy.diag() in Python
asked
May 18, 2022
in
Python
by
sharadyadav1986
numpy-diag
0
votes
ActiveMQ consists of which of the following types of security modes?
asked
May 1, 2022
in
Apache ActiveMQ
by
sharadyadav1986
activemq-security
0
votes
Which type of Zabbix Item/s does not require Zabbix Agent to be deployed in target?
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-items
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
Page:
« prev
1
...
829
830
831
832
833
834
835
836
837
838
839
...
1000
next »
...