Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
In the stateless JWT authentication method, user sessions are not stored at server side.
asked
Aug 21, 2021
in
Authentication
by
rajeshsharma
jwt-authentication
authentication-method
+1
vote
1
answer
The maximum number of compute nodes a cluster can have is ____________.
asked
Feb 1, 2022
in
Amazon Database
by
sharadyadav1986
compute-nodes
+1
vote
2
answers
What are some tools used for DevOps? Describe your experience working with any of these tools.
asked
Aug 8, 2020
in
DevOps
by
sharadyadav1986
#devops-tools
#tools-devops
#devops-experience-tools
0
votes
1
answer
Where are PhoneGap project-related configurations stored?
asked
Mar 11, 2022
in
PhoneGap
by
rajeshsharma
phonegap-configuration
+1
vote
1
answer
Which of the following is not true?
asked
Feb 2, 2022
in
Apache Pig
by
sharadyadav1986
pig-task
+2
votes
1
answer
The feature of logging into social networks can be facilitated using Keycloak
asked
Jan 1, 2022
in
Keycloak
by
GeorgeBell
keyclock
0
votes
1
answer
Dependent variables refer to those variables __________.
asked
Feb 13, 2022
in
Advanced Statistics Probability
by
DavidAnderson
advanced-statistics-and-probability-interview-question-answer
0
votes
1
answer
What is the command to delete a branch in your remote repository?
asked
Feb 13, 2022
in
Git
by
rajeshsharma
git-delete
+1
vote
0
answers
Which of the following statements assigns the value 25 to the variable x in Python:
asked
Jan 30, 2022
in
Python
by
sharadyadav1986
python-assignment
Python-questions-answers
0
votes
1
answer
There can be more than one root element in the template of a component.
asked
Mar 6, 2022
in
VueJS
by
sharadyadav1986
root-element
vuejs
0
votes
1
answer
Lien, one of the modes of charging securities, is the right to retain:
asked
Feb 27, 2022
in
Mortgage
by
DavidAnderson
mcq-questions-loans-and-advances
0
votes
1
answer
What is Cross-site scripting (XSS) attack, and how to avoid it?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
by
rajeshsharma
cross-site-scripting
0
votes
1
answer
Where are Strategic Themes found in the SAFe Big Picture?
asked
Mar 4, 2020
in
Agile
by
emanuela.scavizzi
#agile-in-big-picture
#agile-process
#safe-agile
0
votes
1
answer
A well planned and successfully managed AR program is important to achieve the G T objectives of TCS.
asked
Feb 9, 2022
in
Growth and Transformation
by
rajeshsharma
ar-program
0
votes
1
answer
___________ is a Java Web application used to schedule Apache Hadoop jobs.
asked
Mar 5, 2022
in
Apache Oozie
by
rajeshsharma
apache-oozie
web-application
0
votes
1
answer
Denial of Service hinders _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
service-hinders
threat-modeling
0
votes
1
answer
What are different types of integration runtime in ADF?
asked
Sep 23, 2021
in
Azure Data Factory
by
Robin
adf-integration
0
votes
1
answer
One of the differences between overdraft and cash credit is:
asked
Feb 27, 2022
in
Mortgage
by
DavidAnderson
mcq-questions-loans-and-advances
0
votes
2
answers
What are the features of Standalone (local) mode?
asked
Nov 5, 2020
in
Hadoop
by
SakshiSharma
#hadoop-standalone-mode
#hadoop-local-mode
0
votes
1
answer
Which of the following is considered as the unsolicited commercial email?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
Page:
« prev
1
...
934
935
936
937
938
939
940
941
942
943
944
...
1000
...
next »
...