Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
Which of the following is not an authentication method?
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
authentication-method
0
votes
1
answer
Which among the following option is used by ActiveMQ?
asked
Apr 30, 2022
in
Apache ActiveMQ
by
AdilsonLima
apache-activemq
0
votes
1
answer
Clutter helps in increasing the communication with Audiences?
asked
Apr 9, 2022
in
Storytelling with Data
by
sharadyadav1986
clutter
0
votes
1
answer
In computer security, a component of the malware, which is responsible for performing malicious action is referred to as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
0
votes
1
answer
For the given statement,
asked
Apr 21, 2022
in
Scala Constructs
by
sharadyadav1986
scla-function
0
votes
1
answer
Do I Need A New Sdk To Use The Table Api?
asked
May 1, 2022
in
Azure Cosmos DB
by
sharadyadav1986
azure-table-api
0
votes
1
answer
Which of the following are the types of scanning?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
scanning-types
0
votes
1
answer
The ________ contains information about the user, such as username and email.
asked
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
user-information
keycloak
0
votes
1
answer
Mention what are the logging methods provided by logger class?
asked
Apr 25, 2022
in
Apache Log4j
by
rajeshsharma
logger-class
0
votes
1
answer
How will you explain a linked list and an array?
asked
May 8, 2022
in
Machine Learning
by
sharadyadav1986
linked-list
0
votes
1
answer
explain numpy.ravel() in Python
asked
May 18, 2022
in
Python
by
sharadyadav1986
numpy-ravel
0
votes
1
answer
Developments, corrections, and repairs are recorded in tasks and transported using _.
asked
Apr 24, 2022
in
SAP ABAP
by
sharadyadav1986
transport-system
0
votes
1
answer
Which of the following analyses only the beginning of a string?
asked
Apr 6, 2022
in
Python Packages and Data Access
by
sharadyadav1986
python-string
python-packages-list
python-sqlalchemy
python-data-access
python-file
python-directory
python-date-time
python-server
python-command
python-object
python-packages-download
python-packages-example
python-packages-install
0
votes
1
answer
What is Zend Auth?
asked
Apr 22, 2022
in
Zend Framework
by
sharadyadav1986
zend-auth
0
votes
1
answer
Drill exhibits a low overhead protobuf-based RPC protocol to interact with the clients.
asked
Apr 17, 2022
in
Apache Drill
by
sharadyadav1986
apache-drill
rpc-protocol
0
votes
1
answer
What is the use of the create-react-app command in the React.js application?
asked
Apr 15, 2022
in
ReactJS
by
Robindeniel
create-react-app
react-features
react-vs-vue
react-jsx
react-components
react-statereact-props
react-props-validation
react-state-vs-props
react-events
react-lists
react-keys
react-refs
react-fragments
react-router
react-css
react-animation
react-bootstrap
react-map
0
votes
1
answer
Explain Streams in Scala.
asked
Apr 21, 2022
in
Scala Constructs
by
sharadyadav1986
scala-streams
0
votes
1
answer
Which of the following is not an example of sequential data?
asked
Feb 4, 2022
in
Sequence Models
by
sharadyadav1986
sequential-data
0
votes
1
answer
explain numpy.asarray_chkfinite() in Python
asked
May 19, 2022
in
Python
by
john ganales
numpy-asarray-chkfinite
0
votes
1
answer
Zabbix actions define __________.
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-actions
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
Page:
« prev
1
...
862
863
864
865
866
867
868
869
870
871
872
...
1000
...
next »
...