Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
Which of the following is not an advantage of cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
+1
vote
1
answer
Which of the following is the correct use of the strcmp() function in PHP?
asked
May 11, 2022
in
PHP
by
sharadyadav1986
strcmp
0
votes
1
answer
In order to ensure the security of the data/ information, we need to ____________ the data:
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
data-information
0
votes
1
answer
What is the meaning of Overfitting in Machine learning?
asked
May 7, 2022
in
Machine Learning
by
sharadyadav1986
overrfitting
0
votes
1
answer
Tcode for transport requests.
asked
Apr 24, 2022
in
SAP ABAP
by
sharadyadav1986
tcode
transport-system
0
votes
1
answer
Cloud Foundry is ____________ agnostic.
asked
Feb 8, 2022
in
Cloud Foundry
by
Robindeniel
cloud-foundry
0
votes
1
answer
explain numpy.rollaxis() in Python
asked
May 18, 2022
in
Python
by
sharadyadav1986
numpy-rollaxix
0
votes
1
answer
Types of media supported by Zabbix is/are
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-mdeia
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
+1
vote
1
answer
Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
1
answer
Which cryptography technique uses the same key to encrypt and decrypt?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
cryptography-techniques
0
votes
1
answer
_____________ is the automated system used for continuous integration (Build Code, Create Packages and Run Code).
asked
Oct 26, 2020
in
DevOps Culture
by
AdilsonLima
#continous-intergration
devops
devops-culture
0
votes
1
answer
List web server software requirements for installing SilverStripe CMS ?
asked
May 14, 2022
in
SilverStripe
by
Robin
silverstripe
+1
vote
1
answer
Cassandra support data transfer from RDBMS systems in and out of Cassandra
asked
May 22, 2022
in
Cassandra
by
AdilsonLima
cassandra-support-data-transfer
0
votes
2
answers
Continuous Delivery focuses on manual delivery pipeline.
asked
Jun 12, 2019
in
DevOps Culture
by
anonymous
#devops
#devopsculture
#learn-devops
#devops-101
#pallet-devops
#devops-rackspace
#devops-means
+1
vote
1
answer
Can I Connect To Azure Table Storage And Azure Cosmos Db Table Api Side By Side In The Same Application?
asked
May 1, 2022
in
Azure Cosmos DB
by
sharadyadav1986
azure-table
0
votes
1
answer
What are the various document Processing Stages?
asked
Feb 12, 2022
in
ABBYY FlexiCapture
by
AdilsonLima
abbyy-flexicapture-interview-question-answer
0
votes
1
answer
explain Numpy.asmatrix() in Python with Example
asked
May 17, 2022
in
Python
by
sharadyadav1986
numpy-asmatrix
+1
vote
2
answers
Explain Prometheus in Kubernetes
asked
May 25, 2021
in
Kubernetes K8s
by
sharadyadav1986
kubernetes-prometheus
prometheus
0
votes
1
answer
Which of the following option can be defined as a person should have the necessary permission to execute?
asked
May 1, 2022
in
Apache ActiveMQ
by
sharadyadav1986
activemq-permission
0
votes
1
answer
Which one of the following is actually considered as the first computer virus?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
computer-virus
Page:
« prev
1
...
840
841
842
843
844
845
846
847
848
849
850
...
1000
...
next »
...