Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
The confidentiality of information is compromised when:
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
You have backed up your project information on media. The project will continue for the next two years. How often should the restorability test be done?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
You were creating some design/flow diagrams on paper for a sensitive project of a client. when suddenly the PL calls you for an urgent meeting in a meeting room which is outside the Offshore Development Center (ODC). What is the appropriate way to handle the papers?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
What are the uses of Swagger API?
asked
Aug 15, 2023
in
API Gateways
by
GeorgeBell
swagger
api
0
votes
It is always acceptable to send business information from your customer-provided email ID to your email ID. Is this statement True or False?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
isecurity
0
votes
What would the “jar: jar” goal do on Maven?
asked
Aug 19, 2023
in
Maven - Coalescing Pipeline
by
GeorgeBell
maven-interview-questions-answers
0
votes
What are the differences between Apache Ant and Maven?
asked
Aug 19, 2023
in
Maven - Coalescing Pipeline
by
GeorgeBell
maven-interview-questions-answers
0
votes
What is binary search tree data structure? What are the applications for binary search trees?
asked
Aug 10, 2023
in
DBMS
by
DavidAnderson
dbms
0
votes
Rakesh has been deputed to a client located in the US. The client has provided a laptop to Rakesh. His family resides in India. Every evening he uses the client-provided laptop to chat with his family through a webcam using software he has installed directly from the internet. Which of the following is correct?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
List out the build, source and test source directory for POM in Maven?
asked
Aug 19, 2023
in
Maven - Coalescing Pipeline
by
GeorgeBell
maven-interview-questions-answers
0
votes
SparkContext uses Py4J to launch a JVM and create a
asked
Aug 17, 2023
in
Spark Preliminaries
by
GeorgeBell
spark-interview-questions-answer
0
votes
How to change the color of the cursor CSS ?
asked
Aug 17, 2023
in
CSS
by
GeorgeBell
css-interview-questions-answers
0
votes
What is Backreferencing in Regular expressions?
asked
Aug 15, 2023
in
ReactJS
by
GeorgeBell
regular-expressions-interview-questions-answers
0
votes
Which of the following will you do while planning? If you are working towards your personal growth. Select all that apply.
asked
Aug 13, 2023
in
Other
by
SakshiSharma
wings2
0
votes
What are the minimum required elements in POM?
asked
Aug 19, 2023
in
Maven - Coalescing Pipeline
by
GeorgeBell
maven-interview-questions-answers
0
votes
The technique of negotiation in which we keep asking for small items, one at a time, until we are getting agreement that we have gotten a lot is _______.
asked
Aug 14, 2023
in
Other
by
sharadyadav1986
wings2
0
votes
How to apply analytical thinking while problem solving? Select all that apply.
asked
Aug 14, 2023
in
Other
by
sharadyadav1986
wings2
0
votes
What is array data structure? What are the applications of arrays?
asked
Aug 9, 2023
in
DBMS
by
DavidAnderson
data-structure-interview-questions
0
votes
To whom should you express your concerns and suggestions related to information security at your location?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
How does one share data between components in Angular?
asked
Aug 13, 2023
in
Angular
by
DavidAnderson
angular-interview-questions-answers
Page:
« prev
1
...
344
345
346
347
348
349
350
351
352
353
354
...
1000
next »
...