Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
What is the deployment blueprint for an application?
asked
Oct 27, 2021
in
Cloud Foundry
by
Robin
development-foundry
0
votes
Mention the things that can be achieved by the Nagios DevOps tool?
asked
Jul 18, 2023
in
Nagios
by
Robin
nagios
devopstool
0
votes
What do you understand by NRPE or Nagios Remote Plugin Executor of Nagios?
asked
Jul 18, 2023
in
Nagios
by
Robin
nrpe
0
votes
Explain the working of Nagios, how does it work?
asked
Jul 18, 2023
in
Nagios
by
Robin
nagios
0
votes
What is Nagios?
asked
Jul 17, 2023
in
Nagios
by
Robin
nagios
0
votes
What are port numbers used by Nagios for monitoring purpose?
asked
Jul 18, 2023
in
Nagios
by
Robin
nagios-portnumbers
0
votes
What is a service?
asked
Jul 10, 2023
in
Angular
by
Robindeniel
service
0
votes
Describe the active and passive check in Nagios
asked
Jul 17, 2023
in
Nagios
by
Robin
nagios
0
votes
A designer has to translate the wireframes into a design. Communication is required to support the wireframe, explaining why page elements are placed there.
asked
Feb 6, 2020
in
Data Science
by
rahuljain1
#wireframes-design
0
votes
Explain how custom elements works internally?
asked
Jul 13, 2023
in
Angular
by
sharadyadav1986
custom
elements
0
votes
What is zone?
asked
Jul 16, 2023
in
Angular
by
john ganales
angular-zone
0
votes
How does Nagios work?
asked
Jul 17, 2023
in
Nagios
by
Robin
nagios
0
votes
Textures that you can feel and see are called as _________.
asked
Feb 22, 2022
in
Novice Guide to Visual Design
by
sharadyadav1986
texture
design
0
votes
Select all of the long range wireless communication protocols we studied
asked
Jul 17, 2023
in
IOT Prime
by
Robin
wirelesscommunicationprotocols
0
votes
How files are stored in Neo4J?
asked
Jan 24, 2023
in
Neo4j
by
sharadyadav1986
files-store
neo4j
0
votes
Adware tracks browsing habits to provide better-targeted ads based on users interests.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
adware-tracks
0
votes
What are the design goals of service workers?
asked
Jul 16, 2023
in
Angular
by
john ganales
design
goals
0
votes
Which of the following are the types of vulnerabilities that hackers look out for in application to target them for attacks?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Which among the following enhances WS-Security to facilitate a mechanism for issuing, renewing, and validating security tokens?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
ws-security
0
votes
Why is it being said that Nagios is object oriented?
asked
Jul 18, 2023
in
Nagios
by
Robin
nagios
i
Page:
« prev
1
...
378
379
380
381
382
383
384
385
386
387
388
...
1000
next »
...