Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
“Cyberspace” was coined by _________.
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyberspace
0
votes
What are the different types of Blockchain for transactions?
asked
May 23, 2022
in
BlockChain
by
sharadyadav1986
blockchain-tansactions
0
votes
Zabbix supports encrypted communication using __________ protocol.
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-protocol
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
explain numpy.tril() in Python
asked
May 18, 2022
in
Python
by
sharadyadav1986
numpy-tril
0
votes
Explain numpy.arrange() in Python
asked
May 18, 2022
in
Python
by
sharadyadav1986
numpy-arrange
0
votes
Which cryptography technique uses the same key to encrypt and decrypt?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
cryptography-techniques
+2
votes
__ can be used to over a SQL as well as NoSQL database.
asked
Jan 10, 2022
in
Spring Framework Database Integration
by
rajeshsharma
nosql-database
0
votes
Templates contain different entities which include(s) __________.
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbox-template
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
Types of media supported by Zabbix is/are
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-mdeia
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
Select the most appropriate situation for that a blind search can be used.
asked
May 14, 2022
in
Artificial Intelligence
by
Robin
artificial-intelligence
0
votes
Which of the following known as the oldest phone hacking techniques used by hackers to make free calls?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
phone-hacking
0
votes
Which of the following method is used to hash a user’s password+salt in Kerberos?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
hash
kerbores
0
votes
What is cognitive technology?
asked
May 20, 2022
in
Watson AI
by
sharadyadav1986
cognitive-technology
0
votes
What are the similarities and differences between bagging and boosting in Machine Learning?
asked
May 8, 2022
in
Machine Learning
by
sharadyadav1986
bagging
boosting
0
votes
Which type of remote URL does not require your user-name and password while for cloning or pushing?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
remote-url
clone-password
0
votes
Data Operations – Authentication in ADLS is based on
asked
Jan 31, 2022
in
Azure Data Lake Storage
by
sharadyadav1986
data-authentication
+1
vote
Which of the following is the correct use of the strcmp() function in PHP?
asked
May 11, 2022
in
PHP
by
sharadyadav1986
strcmp
0
votes
Explain numpy.fromiter() in Python
asked
May 17, 2022
in
Python
by
sharadyadav1986
numpy-fromiter
0
votes
What is the difference between SaaS, PaaS, and IaaS?
asked
Oct 31, 2020
in
Azure
by
rahuljain1
#saas-vs-paas
#paas-vs-iaas
#saas
#iaas
0
votes
What is the use of fopen() function in PHP?
asked
May 11, 2022
in
PHP
by
sharadyadav1986
fopen
Page:
« prev
1
...
834
835
836
837
838
839
840
841
842
843
844
...
1000
next »
...