Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
Home
Questions
Recent Questions
0
votes
Q: Spark SQL can read and write data from Hive Tables
asked
Aug 18, 2023
in
Spark Sql
by
GeorgeBell
spark-sql-interview-questions-answers
0
votes
Q: Which among the following is an example of Transformation
asked
Aug 18, 2023
in
Spark Preliminaries
by
GeorgeBell
spark-interview-iterview-questions-answers
0
votes
Q: Tom has joined a project. He has been assigned a desktop. This desktop was used by Jerry, who is now released from the project. Upon logging on, Tom found personal non-business files stored in the computer by Jerry. If you were Tom, what action would you take?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: How would you protect company/customer-provided laptops during air travel?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: You observe that one of your company colleagues keeps sending unsolicited e-mails that are either offensive, obscene, or at times defamatory. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: You have a business need to use an Internet-based chat messenger not approved by the company. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: You are taking a printout of a debugging code you have written. What precautions do you need to take?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: While working on the office network, which of the following are not acceptable practices?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: You need to mail the estimation sheet created as a response to one RFP to your Onsite BRM. What care will you take while sending the e-mail with regards to its label?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: The information displayed on the company website is classified as company Internal. This statement is True or False.
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: The access-related controls for Confidential classification are more stringent as compared to Internal classification. Is this statement True or False and why?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: Why do you need a Business Continuity Plan?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: While working on an assignment where you are an administrator for the database, your password:
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
secuity
0
votes
Q: What data would you typically select for the backup?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: Where can you find the company process for Business Continuity Management?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Q: You are working on a project at a client site. The client has provided you with an e-mail id on their domain, and you are not allowed to access the company e-mail id through the client network. What will you do to access e-mails received on our company ID? Select the appropriate choice.
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
secuity
0
votes
Q: Which among the following is a/are feature(s) of DataFrames?
asked
Aug 17, 2023
in
Spark Preliminaries
by
GeorgeBell
spark-interview-questions-answers
0
votes
Q: SparkContext uses Py4J to launch a JVM and create a
asked
Aug 17, 2023
in
Spark Preliminaries
by
GeorgeBell
spark-interview-questions-answer
0
votes
Q: PySpark is built on top of Spark's Java API
asked
Aug 17, 2023
in
Spark Preliminaries
by
GeorgeBell
pyspark-final-assessment
0
votes
Q: Spark was first coded as a C project
asked
Aug 17, 2023
in
Spark Preliminaries
by
GeorgeBell
spark-interview-questions-answers
0
votes
Q: Which among the following programming languages does Spark support
asked
Aug 17, 2023
in
Spark Preliminaries
by
GeorgeBell
pyspark-mcq-questions-answers
0
votes
Q: The confidentiality of information is compromised when:
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: A friend of yours shares their password with you. What should you do in this situation?
asked
Aug 17, 2023
by
rajeshsharma
securityt
0
votes
Q: How should an employee handle classified information while traveling?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: The company recommended method of disposing of non-electronic information in paper form classified as Restricted, Confidential, or Private & Confidential is the same. Is this statement True or False?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: Which of the following is most appropriate with regard to an organization's Business Continuity Planning (BCP) framework?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: You are executing a project and you have come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: You are searching the Internet for some information. After clicking a link on one page, you become suspicious that it may have triggered a virus or something which is wrong. What should be your immediate reaction?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
isecurity
0
votes
Q: Which of the following is not true about Information classified as Private and confidential?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: You have backed up your project information on media. The project will continue for the next two years. How often should the restorability test be done?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
Page:
« prev
1
...
166
167
168
169
170
171
172
173
174
175
176
...
667
next »
...