Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
Banker’s right to cancel advance at any time with or without intimation is acknowledged by the borrower by signing:
asked
Feb 26, 2022
in
Loan
by
sharadyadav1986
borrower-sign
loan
+2
votes
1
answer
Which of the following AI techniques is are used in Chatbots?
asked
Jan 1, 2022
in
Leading And Managing Teams
by
sharadyadav1986
ai-techniques
0
votes
1
answer
What are the common security threats?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Processing each node of the linked list exactly once is called as __________.
asked
Jan 7, 2022
in
Data Structures & Algorithms
by
rajeshsharma
linked-list
0
votes
1
answer
What is an incident trigger?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
by
rajeshsharma
incident-trigger
0
votes
1
answer
From application security perspective, why should a CAPTCHA be used in a web application?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
application-security
captcha-security
secure-programming-practices
0
votes
1
answer
Letter of disclaimer is taken from:
asked
Feb 26, 2022
in
Loan
by
sharadyadav1986
letter-of-disclaimer
loan
0
votes
1
answer
What is an automated incidence response?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
by
rajeshsharma
automated-incidence
0
votes
2
answers
What is the difference between deleteMultiple() and deleteRecord() in Servicenow?
asked
Aug 31, 2020
in
Service Now
by
AdilsonLima
#servicenow
+1
vote
1
answer
Which mode does PigUnit work by default?
asked
Feb 2, 2022
in
Apache Pig
by
sharadyadav1986
pigunit
0
votes
1
answer
Amazon Neptune shares its operational technology with _______________.
asked
Feb 5, 2022
in
Amazon Neptune
by
sharadyadav1986
neptune-technology
+1
vote
1
answer
Graph Databases are preferred when ___________.
asked
Jan 29, 2022
in
Amazon Neptune
by
sharadyadav1986
graph-database
+1
vote
1
answer
Which of the following is/are true about combiners?
asked
Jun 28, 2021
in
HDFS
by
Robindeniel
combiners
0
votes
1
answer
In SVD, the matrix A of dimension m x n can be decomposed in to A USVT, where V is a ___________.
asked
Dec 22, 2021
in
Image Classification
by
rajeshsharma
svd
matrix-dimension
0
votes
1
answer
What does cyber security protect?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
0
votes
1
answer
______ CLI command is used to uninstall a module.
asked
Nov 9, 2020
in
Magneto
by
sharadyadav1986
#magneto-cli-command
magneto-module-unstill
0
votes
1
answer
In which section of the azure blob dataset JSON file, the file name is defined?
asked
Sep 23, 2021
in
Azure Data Factory
by
Robin
blob-dataset
json
0
votes
1
answer
What refers to location and management of clouds infrastructure?
asked
Jan 29, 2022
in
Angular Oriana
by
sharadyadav1986
clouds-infrastructure
+1
vote
1
answer
Which of the following is used to view the map reduce execution steps?
asked
Feb 2, 2022
in
Apache Pig
by
sharadyadav1986
pig-map-reduce
map-reduce-execution
0
votes
1
answer
Can flare DNS?
asked
Mar 13, 2022
in
Azure
by
rajeshsharma
flare-dns
Page:
« prev
1
...
941
942
943
944
945
946
947
948
949
950
951
...
1000
...
next »
...