Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
Which one of the following usually used in the process of Wi-Fi-hacking?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
wifi-hacking
+1
vote
1
answer
Which one of these programs is directly focused on G&T capability development?
asked
Jan 18, 2022
in
Growth and Transformation
by
rajeshsharma
capability-developent
0
votes
1
answer
Which of the following threat can be handled using access control?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-handling
threat-modeling
access-control
0
votes
1
answer
What is the domain name of PWS?
asked
Feb 9, 2022
in
Cloud Foundry
by
GeorgeBell
cloud-foundry
0
votes
1
answer
Point out the correct statement.
asked
Mar 5, 2022
in
Apache Oozie
by
rajeshsharma
apache-oozie
oozie
0
votes
1
answer
For which of the following criteria can Spring boot auto configuration be done?
asked
Mar 1, 2020
in
Spring Framework Database Integration
by
SakshiSharma
#spring-boot-configuration
gradle-questions-answers
0
votes
1
answer
Which of the following statements is correct for variable names in Python language?
asked
Jan 18, 2021
in
Python
by
SakshiSharma
#python-variable
Python-questions-answers
0
votes
1
answer
What is the default nature of the Beans defined in spring framework?
asked
Mar 1, 2020
in
Spring Framework Database Integration
by
SakshiSharma
#spring-framework
gradle-questions-answers
spring-boot
0
votes
1
answer
The maximum size of Block Blobs is __________.
asked
Feb 17, 2020
in
Azure
by
rahuljain1
#azure-block-blob
0
votes
1
answer
GraphQL can be used only with SQL.
asked
Mar 2, 2022
in
GraphQL
by
rajeshsharma
graphql-sql
+2
votes
1
answer
FormsModule is imported from @angular/_________ in Model Driven Form.
asked
Jan 2, 2022
in
Angular 2 Routes and Forms
by
rajeshsharma
formmodules
0
votes
0
answers
Data is stored in a Dedicated SQL pool in _____ tables with ____ storage.
asked
Feb 25, 2022
in
Azure Synapse Analytics
by
sharadyadav1986
sql-pool
tables-azure
azure-storage
+1
vote
1
answer
An error message should include the cause of the error and possible solution to get rid of the error.
asked
Jan 26, 2022
in
Usability Principles
by
sharadyadav1986
error-message
0
votes
2
answers
Edge Computing Device in IoT
asked
Feb 24, 2020
in
Internet of Things IoT
by
DavidAnderson
0
votes
1
answer
Hypothecation is called as:
asked
Feb 26, 2022
in
Loan
by
sharadyadav1986
hypothecation
loan
0
votes
1
answer
What is RDD in PySpark?
asked
Mar 13, 2022
in
PySpark
by
rajeshsharma
rdd-pyspark
0
votes
1
answer
Which statement reflects one of the steps for setting initial velocity?
asked
Dec 26, 2019
in
Agile
by
srikanth
0
votes
1
answer
Which of the following aims to integrate the defensive tactics and controls from the Blue Team with the threats and vulnerabilities found by the Red Team into a single objective?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
defensive-tactics
threats
vulnerabilities
0
votes
1
answer
What is SIEM?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
by
rajeshsharma
siem
0
votes
2
answers
What is dispatcher?
asked
Mar 23, 2020
in
SAP
by
AdilsonLima
#sap
#erp
Page:
« prev
1
...
938
939
940
941
942
943
944
945
946
947
948
...
1000
...
next »
...