Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
State the Correct statement.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
#software-security-education
ssa
security-education
+1
vote
What is the recommended length of an Iteration?
asked
Jun 17, 2019
in
Agile
by
tempuser123
#safe
#agile
0
votes
Tree testing is similar to card sorting.
asked
Jun 13, 2019
in
User Research Methods
by
parvinder.singh
#user-research
#user-methods
#user-research-methods
#user#research#methods
0
votes
For users from other nationalities, it is enough to offer a product translated in their respective languages.
asked
Jun 13, 2019
in
User Research Methods
by
parvinder.singh
#user-research
#user-research-methods
#user-methods
+1
vote
Which of the following units/teams are directly involved in providing market research data to accounts and units based on specific requests?
asked
Jan 22, 2022
in
Growth and Transformation
by
Robindeniel
research-data
0
votes
Queries in Azure Boards is used for which of the following? Listing work items to be shared with others, or for bulk updates. Finding groups of work items that have something in common. All the options Creating status and trend charts that can be added to dashboards.
asked
Jun 24, 2020
in
Azure
by
anonymous
azure-devops
0
votes
State True or False: It is not a responsibility of a supplier to deliver secure software.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
secure-software
0
votes
Time Stamp of a file can be viewed with the help of PEview.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
digital-malware-analysis
file-time-stamp
0
votes
Which one of these is a Windows Hashing Tool?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
windows-hashing-tool
0
votes
You add a data disk to an Azure virtual machine. What drive type is created?
asked
Jan 29, 2020
in
Azure
by
Tate
0
votes
G T tagging of an opportunity happens in
asked
Oct 7, 2021
in
Growth and Transformation
by
Robin
gt-opportunity
0
votes
In an Agile environment, what is the main responsibility of a tester?
asked
Dec 5, 2020
in
Agile
by
SakshiSharma
#agile-environment
agile-automation
#agile-testing
0
votes
The program board shows which two items? (Choose two.) What are two items that appear on the program board? (Choose two.)
asked
Mar 4, 2020
in
Agile
by
emanuela.scavizzi
#safe-agile
#scaled-agile-framework
#agile-process
0
votes
SAFe's first Lean-Agile Principle includes "Deliver early and often" and what else?
asked
Mar 4, 2020
in
Agile
by
emanuela.scavizzi
+1
vote
The spelling mistakes in content affect which of the usability heuristics __________.
asked
Jan 27, 2022
in
Usability Principles
by
sharadyadav1986
spelling-mistakes
+4
votes
The Daily Stand-up timebox should not exceed how many minutes?
asked
Jul 31, 2019
in
Agile
by
sheetalkhandelwal
#agile-development
#agile-methodology
#scaled-agile
#scaled-agile-framework
#agile-process
#agile-vs-scrum
#agile-methodologies
#what-is-safe
#safe-agile
#safe-methodology
+1
vote
The MAIN objective of Service Level Management is:
asked
Feb 14, 2020
in
Agile
by
matthenary
0
votes
Which of the following is true about the HAVING clause?
asked
Nov 6, 2021
in
Sql
by
rajeshsharma
sql-clause
+2
votes
User Personal is a quantitative approach.
asked
Jun 13, 2019
in
User Research Methods
by
parvinder.singh
#user-research-methods
#user-methods
#user-research
#devops
0
votes
What does the Continuos Delivery Pipeline enable?
asked
Mar 3, 2020
by
emanuela.scavizzi
#safe-agile
#scaled-agile-framework
#agile-process
Page:
« prev
1
...
9
10
11
12
13
14
15
16
17
18
19
...
1000
next »
...