Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
What is failover IP address?
asked
Mar 13, 2022
in
Azure
by
rajeshsharma
failover-ip-address
0
votes
1
answer
How important is a vulnerability assessment?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
by
rajeshsharma
vulnerability-assessment
0
votes
1
answer
What is PySpark? / What do you know about PySpark?
asked
Mar 13, 2022
in
PySpark
by
rajeshsharma
pyspark
0
votes
1
answer
______ is a proactive way of hunting attacks.
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-hunting
+1
vote
1
answer
_______________ does data compression using the LZO compression algorithm.
asked
Feb 3, 2022
in
Cloudera Rudiments
by
sharadyadav1986
gpl
lzo-compression-algorithm
0
votes
1
answer
For lookup tables, __ distribution is recommended.
asked
Feb 25, 2022
in
Azure Synapse Analytics
by
sharadyadav1986
lookup-table
azure
0
votes
1
answer
The keyword _____________ is used to indicate mutation operation.
asked
Mar 1, 2022
in
GraphQL
by
sharadyadav1986
graphql-keyword
mutation-operation
0
votes
1
answer
The job is used to represented as Directed Acyclic Graphs (DAGs) to specify a sequence of actions to be executed.
asked
Mar 5, 2022
in
Apache Oozie
by
rajeshsharma
directed-acyclic-graphs
oozie
0
votes
1
answer
What is a cloud service role?
asked
Mar 15, 2022
in
Azure
by
sharadyadav1986
azure-cloud-services
0
votes
1
answer
Software patches to Neptune Engine underlying OS are ___________.
asked
Feb 5, 2022
in
Amazon Neptune
by
sharadyadav1986
software-pacthes
0
votes
1
answer
What is the difference between availability zone and availability set?
asked
Mar 13, 2022
in
Azure
by
rajeshsharma
availability-zone
avaialbility-set
+1
vote
1
answer
The mount targets should be created in _________ of the instance.
asked
Jan 30, 2022
in
Amazon S3 Glacier
by
sharadyadav1986
mount-targets
0
votes
1
answer
What is Azure Data Factory?
asked
Mar 14, 2022
in
Azure Data Factory
by
sharadyadav1986
azure-data-factoy
0
votes
1
answer
What is Advanced Persistent Threat? How to handle them?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
by
rajeshsharma
persistent-threat
+1
vote
1
answer
What is the difference between static and dynamic dashboards in Salesforce?
asked
Nov 25, 2021
in
Salesforce
by
DavidAnderson
salesforce
0
votes
1
answer
GraphQL was developed and open-sourced by _________.
asked
Mar 1, 2022
in
GraphQL
by
sharadyadav1986
grapgql-develop
0
votes
1
answer
<course-section @get-marks=”getMarks”></course-section>
asked
Mar 6, 2022
in
VueJS
by
sharadyadav1986
course-section
vuejs
0
votes
1
answer
What are virtual machine scale sets in Azure?
asked
Mar 12, 2022
in
Azure
by
sharadyadav1986
virtual-macine
0
votes
1
answer
Apache Nutch is an application that extends the capability of Lucene Indexing and Searching.
asked
Mar 18, 2022
in
Apache Luence
by
sharadyadav1986
apache-nutch
apaclhe-lucene
apache-lucene-vs-elasticsearch
-apache-lucene-tutorial
-apache-lucene-pronunciation
apache-lucene-vs-solr
apache-lucene-syntax
apache-lucene-architecture
apache-lucene-elasticsearch
apache-lucene-search-engine
lucene-search-c#
lucene-search-syntax
lucene-search-engine
apache-lucene-documentation
0
votes
1
answer
Which of the following are forms of malicious attack?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
Page:
« prev
1
...
925
926
927
928
929
930
931
932
933
934
935
...
1000
...
next »
...