Login
Remember
Register
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
0
votes
1
answer
What are groups of subscriptions called?
asked
Dec 10, 2021
in
Azure
by
rajeshsharma
azure-subscription
0
votes
1
answer
How many free VMs are included per month on the Azure free account in the first 12 months?
asked
Dec 10, 2021
in
Azure
by
rajeshsharma
azure-free-account
0
votes
1
answer
What is a policy initiative in Azure?
asked
Dec 10, 2021
in
Azure
by
rajeshsharma
azure-policy
+1
vote
1
answer
What advantage does an Application Gateway have over a Load Balancer?
asked
Dec 10, 2021
in
Azure
by
rajeshsharma
azure-load-balancer
0
votes
1
answer
Which of the following are one of the advantages of running your cloud in a private cloud?
asked
Dec 10, 2021
in
Azure
by
rajeshsharma
private-cloud
0
votes
1
answer
What data format are ARM templates created in?
asked
Dec 10, 2021
in
Azure
by
rajeshsharma
arm-templates
0
votes
1
answer
Which one is better? Extract or Live connection?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
Can we remove the All options from a Tableau auto-filter?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
If the owner of the published workbook license expires, then can other users see those workbooks?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
+1
vote
1
answer
Can we see SQL generated by Tableau Desktop?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
What are the different ways to use parameters in Tableau?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
State some ways to improve the performance of Tableau.
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
State some reasons for the low performance of Tableau? Explain in detail.
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
Are there any limitations of parameters in Tableau? If yes, give details.
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
How to create a calculated field in Tableau?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
Why should we use Tableau?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
What is the difference between .twb and .twbx extensions?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
Explain the performance testing in terms of Tableau?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
What is the difference between Traditional BI Tools and Tableau?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
Differentiate discrete and continuous data roles in Tableau?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
What are State the components of the dashboard?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
Explain the disaggregation and aggregation of data in Tableau?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
What is VIZQL in Tableau?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
What are Categorize dimensions in Tableau?
asked
Dec 10, 2021
in
Tableau
by
DavidAnderson
tableau
0
votes
1
answer
The security attribute that aims to achieve data privacy and protection against unauthorized disclosure is called ____________.
asked
Dec 9, 2021
in
Cyber Security
by
rajeshsharma
security-attribute
0
votes
1
answer
The security posture of an organization is defined by the ______ link in the chain.
asked
Dec 9, 2021
in
Cyber Security
by
rajeshsharma
security-posture
0
votes
1
answer
Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __________.
asked
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
disrupt-performance
0
votes
1
answer
What is PUP?
asked
Dec 9, 2021
in
Cyber Security
by
rajeshsharma
pup
0
votes
1
answer
________ is designed to extract data from its host computer for marketing purposes.
asked
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
data-extraction
0
votes
1
answer
The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security is called ___________.
asked
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
weaken-security
Page:
« prev
1
...
625
626
627
628
629
630
631
632
633
634
635
...
667
...
next »
Recent questions
...