Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
Types of media supported by Zabbix is/are
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-mdeia
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
1
answer
Data Operations – Authentication in ADLS is based on
asked
Jan 31, 2022
in
Azure Data Lake Storage
by
sharadyadav1986
data-authentication
+3
votes
1
answer
What is SVM in machine learning? What are the classification methods that SVM can handle?
asked
May 8, 2022
in
Machine Learning
by
sharadyadav1986
svm
machine-learning
0
votes
1
answer
_________ is the function of recognizing the demand for goods and services to support the market place.
asked
Apr 8, 2022
in
SAP S/4HANA 'Forecast to Stock’
by
sharadyadav1986
sap-demands
0
votes
1
answer
A Flow Library contains a set of ______ used for common tasks like notarizing a transaction, gathering required signatures, etc.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
Tcode for transport requests.
asked
Apr 24, 2022
in
SAP ABAP
by
sharadyadav1986
tcode
transport-system
+4
votes
1
answer
Eventually Consistent model must not be used when there are __________.
asked
Jan 16, 2020
in
NoSQL
by
sharadyadav1986
#consistent-model
0
votes
1
answer
Which of the following method is used to hash a user’s password+salt in Kerberos?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
hash
kerbores
0
votes
1
answer
In order to ensure the security of the data/ information, we need to ____________ the data:
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
data-information
0
votes
1
answer
Which of the following option can be defined as a person should have the necessary permission to execute?
asked
May 1, 2022
in
Apache ActiveMQ
by
sharadyadav1986
activemq-permission
+1
vote
1
answer
Cassandra support data transfer from RDBMS systems in and out of Cassandra
asked
May 22, 2022
in
Cassandra
by
AdilsonLima
cassandra-support-data-transfer
+1
vote
1
answer
What the aim of conducting A/B Testing?
asked
May 30, 2022
in
Data Science
by
sharadyadav1986
a-b-testing
0
votes
1
answer
Which of the following is not an advantage of cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
+1
vote
1
answer
Which of the following is the correct use of the strcmp() function in PHP?
asked
May 11, 2022
in
PHP
by
sharadyadav1986
strcmp
0
votes
1
answer
What do you understand by Reinforcement Learning technique?
asked
May 7, 2022
in
Machine Learning
by
sharadyadav1986
reinforcement-learning-technique
0
votes
1
answer
Explain Cognos Metric Studio?
asked
May 27, 2022
in
Cognos
by
john ganales
cognos-metric-studio
0
votes
1
answer
Security check can be enforced at compile time by:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-check
security
secure-programming-practices
0
votes
1
answer
Cloud Foundry is ____________ agnostic.
asked
Feb 8, 2022
in
Cloud Foundry
by
Robindeniel
cloud-foundry
0
votes
1
answer
Explain Cognos Analysis Studio?
asked
May 27, 2022
in
Cognos
by
john ganales
cognos-studio
0
votes
1
answer
explain numpy.resize() in Python
asked
May 19, 2022
in
Python
by
john ganales
numpy-resie
Page:
« prev
1
...
840
841
842
843
844
845
846
847
848
849
850
...
1000
...
next »
...