Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
+1
vote
In which year Apache Kafka was developed ?
asked
Jan 29, 2022
in
Big Data | Hadoop
by
sharadyadav1986
apache-kafka
Bigdata-questions-answers
Hadoop-questions-answers
+1
vote
Which of the following says Hadoop provides does Pig break?
asked
Feb 2, 2022
in
Apache Pig
by
sharadyadav1986
pig-hadoop
0
votes
Does GraphQL support server-side caching?
asked
Mar 2, 2022
in
GraphQL
by
rajeshsharma
server-side-cache
graphql-cache
0
votes
Processing each node of the linked list exactly once is called as __________.
asked
Jan 7, 2022
in
Data Structures & Algorithms
by
rajeshsharma
linked-list
0
votes
Which one of the following is a type of software that supports the virtual machine?
asked
Sep 14, 2021
in
Cloud Computing
by
rajeshsharma
virtual-machine
0
votes
Write the SQL query to get the third maximum salary of an employee from a table named employees.
asked
Nov 8, 2021
in
Sql
by
rajeshsharma
sql-query
0
votes
A team is currently planning on using Azure for hosting resources.
asked
Feb 15, 2022
in
Azure Virtual Network
by
rajeshsharma
azure-resources
multifactor-authentication
+1
vote
Aurora is both MySQL and Postgre SQL compatible?
asked
Feb 1, 2022
in
Amazon Database
by
sharadyadav1986
postgre-sql
+1
vote
The types of Big Data are _________.
asked
Jan 29, 2022
in
Big Data | Hadoop
by
sharadyadav1986
bigdata-types
Bigdata-questions-answers
Hadoop-questions-answers
+2
votes
Containers resolve security issues.
asked
Jan 1, 2022
in
Infrastructure-as-Code
by
AdilsonLima
infrastructure-as-code
+1
vote
Which of the following is true about Pig?
asked
Feb 2, 2022
in
Apache Pig
by
sharadyadav1986
pig-uses
0
votes
A way of positioning data in a page is called _________?
asked
Jan 29, 2022
in
Angular Oriana
by
sharadyadav1986
data-positioning
0
votes
There are various HTTP authentication mechanisms to authenticate a user. Login credentials are sent to the web server in clear text, in which of the following authentication scheme?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
http-authentication
authentication
login-credentials
secure-programming-pactices
0
votes
What are the fundamental components of IoT?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-components
0
votes
Good customer relationship management can help in
asked
Feb 9, 2022
in
Growth and Transformation
by
rajeshsharma
relationship-management
0
votes
Which tool within the Azure Portal will make specific recommendations based on your actual usage for how you can improve your use of Azure?
asked
Dec 2, 2021
in
Azure
by
rajeshsharma
azure-portal
0
votes
Which of the following threat can be handled using access control?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-handling
threat-modeling
access-control
0
votes
Which of the following commands do we use to open up a proxy on localhost for the Kubernetes cluster?
asked
Dec 26, 2021
in
Kubernetes K8s
by
SakshiSharma
kubernetes-cluster
0
votes
What happens if Azure does not meet its own Service Level Agreement guarantee (SLA)?
asked
Dec 2, 2021
in
Azure
by
rajeshsharma
service-level-agreement
+1
vote
Which statistical technique deals with finding a structure in a collection of unlabeled data?
asked
Dec 31, 2021
in
Unstructured Data Classification
by
rajeshsharma
statistical-technique
Page:
« prev
1
...
938
939
940
941
942
943
944
945
946
947
948
...
1000
next »
...