Login
Remember
Register
Ask a Question
Hot questions
+1
vote
1
answer
Request handled okay when issued by browser, but not when issued by ASP.NET application on the same machine
asked
Feb 1, 2022
in
Other
by
DavidAnderson
interview-question-answer
+1
vote
1
answer
FormGroups can nest inside other FormGroups.
asked
Jan 2, 2022
in
Angular 2 Routes and Forms
by
rajeshsharma
formgroups
+1
vote
1
answer
S3 does not allow transitions of objects that are less than __________.
asked
Jan 5, 2022
in
Amazon Storage (S3)
by
sharadyadav1986
s3-transitions
0
votes
1
answer
Which command is used to create an object?
asked
Dec 26, 2021
in
Kubernetes K8s
by
SakshiSharma
kubernetes-objects
0
votes
1
answer
Explain the indexing in Cosmos DB.
asked
Jan 28, 2022
in
Azure Cosmos DB
by
sharadyadav1986
cosmosdb-index
+2
votes
1
answer
What is the difference between an Inner Class and a Sub-Class?
asked
Jan 20, 2022
in
JAVA
by
rajeshsharma
inner-class
Java-questions-answers
+1
vote
1
answer
When ngAfterContentChecked event get called in Angular 2 Application Lifecycle?
asked
Jan 24, 2022
in
Angular
by
sharadyadav1986
ngaftercontentchecked-event
0
votes
1
answer
Which of the following is the Non-Relational DB service offered by AWS?
asked
Feb 1, 2022
in
Amazon Database
by
sharadyadav1986
db-sevices
0
votes
2
answers
A software robot is trained in a live environment.
asked
Jan 26, 2021
in
Robotic Process Automation
by
SakshiSharma
#software-robot
rpa
+1
vote
1
answer
Alias commands are _____________.
asked
Jan 17, 2022
in
PowerShell
by
rajeshsharma
alias-command
0
votes
1
answer
Which of the following is also known as compute in azure?
asked
Jan 28, 2022
in
Azure
by
AdilsonLima
azure-essentials
0
votes
1
answer
Cloud Foundry CLI is used to ___________.
asked
Jan 8, 2022
in
IBM Watson AI
by
sharadyadav1986
cloud-foundry
0
votes
1
answer
The Foce.com and windows Azure are examples of which of the following?
asked
Sep 5, 2021
in
Cloud Computing
by
SakshiSharma
azure-windows
foce
com
0
votes
1
answer
Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
string-attack
web-application-attack
secure-programming-practices
+3
votes
1
answer
Which processor sends any received records from its upstream processors to a specified Kafka topic ?
asked
Jan 8, 2022
in
Kafka Premiera Ola
by
GeorgeBell
kafka
premiera
ola
+1
vote
1
answer
Read-after-write consistency in S3 is only for new objects, and eventual consistency is for overwrites and deletes.
asked
Jan 4, 2022
in
Amazon Storage (S3)
by
sharadyadav1986
read-after-consistency
0
votes
1
answer
What is NOT an Agile methodology?
asked
Apr 21, 2021
in
Agile
by
rajeshsharma
agile
planning
agile-mcq
agile-mcq-2021
agile-interview-questions
agile-questions-answers
+1
vote
1
answer
Psychology along with Text analytics is used for ________________.
asked
Jan 14, 2022
in
Watson AI
by
GeorgeBell
watson-ai
0
votes
1
answer
What package is required to create a Universal app?
asked
Jan 29, 2022
in
Angular Oriana
by
sharadyadav1986
universal-app
+2
votes
1
answer
What are bitwise operators and what is the value from a database design perspective?
asked
Jan 15, 2022
in
Sql
by
GeorgeBell
t-sql
Page:
« prev
1
...
960
961
962
963
964
965
966
967
968
969
970
...
1000
...
next »
...