Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
_____________ is the automated system used for continuous integration (Build Code, Create Packages and Run Code).
asked
Oct 26, 2020
in
DevOps Culture
by
AdilsonLima
#continous-intergration
devops
devops-culture
+1
vote
1
answer
Who is known as the father of PHP?
asked
May 11, 2022
in
PHP
by
sharadyadav1986
php-father
php-developer
0
votes
1
answer
Zabbix supports encrypted communication using __________ protocol.
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-protocol
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
1
answer
In the CIA Triad, which one of the following is not involved?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
cia
0
votes
1
answer
Is SilverStripe is opensource? From where you can download it?
asked
May 14, 2022
in
SilverStripe
by
Robin
silverstripe
0
votes
1
answer
what are the Advantages of Scala
asked
Apr 21, 2022
in
Scala Constructs
by
sharadyadav1986
scala-advantages
+1
vote
1
answer
Which PHP function determines the last access time of a file?
asked
May 13, 2022
in
PHP
by
john ganales
php-file
0
votes
1
answer
What is the method to force close a ToolTip, which is currently visible?
asked
May 28, 2022
in
WPF
by
sharadyadav1986
wpf-tooltip
0
votes
1
answer
Jenkins build job cannot be triggered manually.
asked
May 12, 2022
in
Continuous Integration with Jenkins
by
sharadyadav1986
jenkins-build
0
votes
1
answer
Describe 'Training set' and 'training Test'.
asked
May 8, 2022
in
Machine Learning
by
sharadyadav1986
training-set
training-test
0
votes
1
answer
What is the use of isset() function in PHP?
asked
May 11, 2022
in
PHP
by
sharadyadav1986
isset
0
votes
1
answer
Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user’s information?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
linux
0
votes
1
answer
What is AngularJS BootStrap Process?
asked
May 21, 2022
in
AngularJS Packaging and Testing
by
sharadyadav1986
angularjs-bootstrap
0
votes
1
answer
Authentication checks if a user has rights to access content.
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
authentication
kerberos
0
votes
1
answer
Which of the following expression is used to compile the pattern p?
asked
Jan 11, 2021
in
Python
by
SakshiSharma
#python-pattern
pattern
python
Python-questions-answers
0
votes
1
answer
Which cryptography technique uses the same key to encrypt and decrypt?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
cryptography-techniques
+1
vote
1
answer
Which of the following is the use of strpos() function in PHP?
asked
May 11, 2022
in
PHP
by
sharadyadav1986
strpos
+1
vote
1
answer
Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
+1
vote
1
answer
To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
computer-system-protection
0
votes
1
answer
Xamarin applications are compiled to __________.
asked
Mar 27, 2022
in
Xamarin Exordium
by
sharadyadav1986
xamarin-applications
Page:
« prev
1
...
839
840
841
842
843
844
845
846
847
848
849
...
1000
...
next »
...