Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
Evaluate the following Java expression, if x=3, y=5, and z=10:
asked
Apr 8, 2021
in
JAVA
by
SakshiSharma
java
java-questions-and-answers
java-mcq
core-java-mcq
java-multiple-choice-questions
java-questions-2021
java-interview-questions
java-advanced-questions
Java-questions-answers
+1
vote
S3 can be accessed from Amazon VPC using VPC endpoints without requiring an internet gateway.
asked
Jan 4, 2022
in
Amazon Storage (S3)
by
sharadyadav1986
amazon-vpc
+1
vote
Which of the following is not a enterprise feature of MarkLogic?
asked
Jan 10, 2022
in
MarkLogic
by
DavidAnderson
marklogic
0
votes
Confusion Matrix is not a technique used to evaluate the performance of a classifier
asked
Dec 23, 2021
in
Image Classification
by
rajeshsharma
confusion-matrix
+1
vote
Which service monitors Cluster membership ?
asked
Jan 8, 2022
in
Kafka Premiera Ola
by
GeorgeBell
kafka
premiera
ola
+1
vote
A 4-input neuron has weights 1, 2, 3 and 4. The transfer function is linear with the constant of proportionality being equal to 2. The inputs are 4, 10, 5 and 20 respectively. What will be the output?
asked
Oct 22, 2021
in
Artificial Intelligence
by
DavidAnderson
artificial-intelligence
other-ai-algorithms-&-statistics-artificial
intelligence-algorithms
0
votes
_______ is used in combining the records in two different files into a single file.
asked
Jan 7, 2022
in
Data Structures & Algorithms
by
rajeshsharma
file-operation
+1
vote
Can you attach a network interface in one VPC to an instance in another VPC?
asked
Jan 9, 2022
in
Amazon VPC
by
DavidAnderson
amazon
vpc
0
votes
What operating systems does an Azure Virtual Machine support?
asked
Nov 28, 2021
in
Azure
by
rajeshsharma
azure-operating-system
+1
vote
Which preprocessing technique is used for dimensionality reduction?
asked
Dec 23, 2021
in
Image Classification
by
rajeshsharma
preprocessing-technique
0
votes
Which of the following are TCL commands?
asked
Nov 4, 2021
in
Sql
by
john ganales
tcl-command
+1
vote
Pruning is a technique associated with __________
asked
Dec 31, 2021
in
Unstructured Data Classification
by
rajeshsharma
pruning-technique
+1
vote
Which of the following features cannot be accomplished using Slack API?
asked
Jan 23, 2020
in
Data Science
by
sharadyadav1986
#slack-api
+1
vote
Only Nodes have properties in Graph database.
asked
Aug 26, 2019
in
NoSQL
by
Venkatshastri
#big-data
#mongodb
#hadoop
#cassandra
#big-data-analytics
#memebase
#nosql
#no-sql
#sql
#rdbms
+1
vote
You add novalidate attribute to a form to prevent the browser from automatically validating.
asked
Jan 2, 2022
in
Angular 2 Routes and Forms
by
rajeshsharma
novalidate-attribute
+4
votes
In Kafka, the communication between the clients and servers is done with _______ Protocol.
asked
Jan 5, 2022
in
Kafka Premiera Ola
by
GeorgeBell
kafka
premiera
ola
0
votes
JWT tokens are prone to XSS attacks.
asked
Aug 21, 2021
in
Authentication
by
rajeshsharma
jwt-tokens
xss-attacks
0
votes
Edge computing is _____________
asked
Feb 18, 2020
in
Ansible
by
MBarbieri
edge-computing
+1
vote
Choose the correct sequence from the following in unstructured data classification.
asked
Dec 31, 2021
in
Unstructured Data Classification
by
rajeshsharma
unstructured-data-classification
+2
votes
Is there a difference between T-SQL linked server and a synonym?
asked
Jan 14, 2022
in
Sql
by
GeorgeBell
t-sql
Page:
« prev
1
...
973
974
975
976
977
978
979
980
981
982
983
...
1000
next »
...