Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
+1
vote
You can enable access to only trusted clients by specifying an IP address or defining a range of IP addresses by setting up the firewall rules to cut down access to your data lake analytics at network level.
asked
Jan 31, 2022
in
Azure Data Lake Storage
by
sharadyadav1986
ip-address
0
votes
Corda states are immutable objects.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
blockchain
+1
vote
If you copy a file from one folder to another with the same file name using shutil, the file will be overwritten.
asked
Apr 6, 2022
in
Python Packages and Data Access
by
sharadyadav1986
python-copy
python-packages-list
python-sqlalchemy
python-data-access
python-string
python-file
python-directory
python-date-time
python-server
python-command
python-object
python-packages-download
python-packages-example
python-packages-install
0
votes
CF Router provides _______________.
asked
Feb 8, 2022
in
Cloud Foundry
by
Robindeniel
cf-router
0
votes
_________ is used for specifying unique data elements.
asked
Feb 12, 2022
in
RPA with Pega
by
Robindeniel
data-element
0
votes
What Are The Typical Use Cases For Azure Cosmos Db?
asked
Apr 28, 2022
in
Azure Cosmos DB
by
sharadyadav1986
uses-case-azure
cosmos-db
0
votes
Explain what are mambots and mention their categories?
asked
Apr 27, 2022
in
Joomla
by
sharadyadav1986
joomla-mambots
0
votes
Which of the following command is used to combine both date and time?
asked
Apr 6, 2022
in
Python Packages and Data Access
by
sharadyadav1986
python-date-time
python-packages-list
python-sqlalchemy
python-data-access
python-string
python-file
python-directory
python-server
python-command
python-object
python-packages-download
python-packages-example
python-packages-install
+1
vote
Multi factor authentication is one of the DaaS applications
asked
Jan 13, 2022
in
Angular Oriana
by
DavidAnderson
angular-oriana
0
votes
Webpack is recommended for large web applications.
asked
Feb 27, 2022
in
Bundling with Webpack
by
sharadyadav1986
webpack-applications
web-applications
+1
vote
All the operations on a vault can be performed using the AWS Management console.
asked
Jan 30, 2022
in
Amazon S3 Glacier
by
sharadyadav1986
aws-management-console
0
votes
_______ object is used to encapsulate the code that performs certain tasks regularly?
asked
Jan 31, 2022
in
Azure Data Lake Storage
by
sharadyadav1986
azure-object
0
votes
Drill gives appropriate operators and functions that you can practice to drill down into such nested data formats.
asked
Apr 17, 2022
in
Apache Drill
by
sharadyadav1986
apache-drill
functions
0
votes
COGM stands for
asked
Apr 11, 2022
in
SAP S/4HANA Finance demos
by
rajeshsharma
cogm
0
votes
Which graph has very minimal use cases?
asked
Apr 9, 2022
in
Storytelling with Data
by
sharadyadav1986
use-cases
0
votes
Drill applies __________, the open source SQL parser framework, for parsing the incoming queries.
asked
Apr 17, 2022
in
Apache Drill
by
sharadyadav1986
apache-drill
sql-parser
0
votes
If case of an issue during the automation runtime, _________ is the log to check.
asked
Feb 12, 2022
in
RPA with Pega
by
Robindeniel
runtime-automation
pega
0
votes
How Does The Documentdb Api Provide Concurrency?
asked
Apr 28, 2022
in
Azure Cosmos DB
by
sharadyadav1986
documentdb-api
0
votes
Explain what are the format characters used in log4j?
asked
Apr 25, 2022
in
Apache Log4j
by
rajeshsharma
log4j-format-characters
0
votes
What will be the output for function call fun(prnt,5)?
asked
Apr 21, 2022
in
Scala Constructs
by
sharadyadav1986
scala-code
Page:
« prev
1
...
857
858
859
860
861
862
863
864
865
866
867
...
1000
next »
...