Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
What are the different types of algorithms supported in PySpark?
asked
Mar 13, 2022
in
PySpark
by
rajeshsharma
pyspark-algorithms
0
votes
When you run git fetch from my local repo, will it update your local code and target branch?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
git-fetch
target-branch
0
votes
Provision for Bad debts is made out of
asked
Feb 26, 2022
in
Loan
by
sharadyadav1986
bad-debts
provisioning
0
votes
How would you detect a storage-related security incident in the cloud?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
by
rajeshsharma
security-incident
0
votes
When a manufacturer wants to borrow money on the security of raw materials or stock-inprocess which are in the process of being manufactured into finished products, bank prefers:
asked
Feb 27, 2022
in
Mortgage
by
DavidAnderson
mcq-questions-loans-and-advances
0
votes
Which of the following type of values can be passed to color argument of plot function?
asked
Dec 25, 2021
in
Matplotlib
by
rajeshsharma
plot-functions
0
votes
_________ command is used to install PhoneGap CLI globally.
asked
Mar 11, 2022
in
PhoneGap
by
rajeshsharma
phonegap-cli
+1
vote
Choose the correct sequence for classifier building from the following.
asked
Dec 31, 2021
in
Unstructured Data Classification
by
rajeshsharma
classifier-building
0
votes
Which of the following are protocols used for SSO?
asked
Aug 21, 2021
in
Authentication
by
rajeshsharma
sso
sso-protocols
0
votes
Which among the following is most useful to protect complete networks?
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
protect-complete-networks
network-protection
0
votes
What is the main difference between the repository and the powerhouse server?
asked
Feb 19, 2020
in
Azure
by
rahuljain1
#azure-repository
+1
vote
When is it recommended to use 'System Feedback'?
asked
Jan 26, 2022
in
Usability Principles
by
sharadyadav1986
system-feedback
0
votes
What is the Difference between HIDS and NIDS?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
by
rajeshsharma
hids
nids
0
votes
The common modes of creation of charge over the securities against loans and advances are:
asked
Feb 26, 2022
in
Loan
by
sharadyadav1986
securities-charges
loan
loan-securities
0
votes
What are Fault Domains?
asked
Mar 12, 2022
in
Azure
by
sharadyadav1986
fault-domain
0
votes
SDN separates the data and control plane.
asked
Feb 21, 2022
in
Software Defined Networking
by
sharadyadav1986
software-sdn
sdn
software-defined-networking
0
votes
Name the architecture in which a user can own some private servers as well as they can distribute some of the workloads on the public cloud.
asked
Sep 8, 2021
in
AWS
by
sharadyadav1986
aws-achitecture
0
votes
Simple Analyzer removes the Stopwords.
asked
Mar 18, 2022
in
Apache Luence
by
sharadyadav1986
apache-lucene
apache-lucene-vs-elasticsearch
-apache-lucene-tutorial
-apache-lucene-pronunciation
apache-lucene-vs-solr
apache-lucene-syntax
apache-lucene-architecture
apache-lucene-elasticsearch
apache-lucene-search-engine
lucene-search-c#
lucene-search-syntax
lucene-search-engine
apache-lucene-documentation
+2
votes
MongoDB read/write performance can be tuned with the help of Stored Procedures.
asked
May 31, 2019
in
NoSQL
by
aaravkhandelwal.2018
big-data
mongodb
hadoop
cassandra
big-data-analytics
memebase
nosql
no-sql
sql
rdbms
0
votes
What are the key features of any NoSQL Database?
asked
Feb 3, 2020
in
Cassandra
by
rajeshsharma
#nosql-database
Page:
« prev
1
...
908
909
910
911
912
913
914
915
916
917
918
...
1000
next »
...