Login
Remember
Register
User rajeshsharma
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by rajeshsharma
0
votes
1
answer
What is the role of Dalvik in Android development?
asked
Sep 1, 2023
in
Android
dalvik
androiddevelopment
0
votes
1
answer
What are containers?
asked
Sep 1, 2023
in
Android
containers
0
votes
1
answer
Explain different launch modes in Android.
asked
Sep 1, 2023
in
Android
launchmodes
0
votes
1
answer
How would you set up monitoring and logging for Apache Superset to track its performance, detect potential issues, and troubleshoot?
asked
Aug 26, 2023
in
Apache Superset
apache-monitoring
0
votes
1
answer
Apache Superset has wide support for SQL databases. Can you explain how Apache Superset provides cross-database support and how it handles nuances between different SQL dialects?
asked
Aug 26, 2023
in
Apache Superset
sqldatabases
0
votes
1
answer
Describe the process of upgrading Apache Superset to a newer version. What precautions should be taken to ensure a smooth upgrade?
asked
Aug 26, 2023
in
Apache Superset
apachesuperset
0
votes
1
answer
How do you optimize Apache Superset performance? What are some best practices to follow for an efficient deployment?
asked
Aug 26, 2023
in
Apache Superset
supersetperformance
0
votes
1
answer
Discuss Superset’s integration capabilities with other Apache projects such as Apache Kafka, Apache Flink, and Apache Pulsar.
asked
Aug 26, 2023
in
Apache Superset
apachesupersetintegration
0
votes
1
answer
Can you describe some use cases where Apache Superset’s geospatial visualization features may be particularly valuable? How would you set up a geospatial visualization?
asked
Aug 26, 2023
in
Apache Superset
apachesuperset
0
votes
1
answer
Explain how Apache Superset’s alerting and notification features function, and in what scenarios these features would be valuable for informing users of critical insights.
asked
Aug 26, 2023
in
Apache Superset
apachefeatures
0
votes
1
answer
How does Apache Superset’s architecture support High Availability (HA) and ensure resilience against failures?
asked
Aug 26, 2023
in
Apache Superset
apache
superset
0
votes
1
answer
Can you explain the role of Apache Druid in the context of Apache Superset and how it can contribute to scalable and high-performance data analytics?
asked
Aug 26, 2023
in
Apache Superset
apachedruid
0
votes
1
answer
How would you use Apache Superset’s APIs to interact with the platform programmatically and develop custom extensions or integrations?
asked
Aug 26, 2023
in
Apache Superset
apachesupersetapi
0
votes
1
answer
The confidentiality of information is compromised when:
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
A friend of yours shares their password with you. What should you do in this situation?
asked
Aug 17, 2023
securityt
0
votes
1
answer
How should an employee handle classified information while traveling?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
The company recommended method of disposing of non-electronic information in paper form classified as Restricted, Confidential, or Private & Confidential is the same. Is this statement True or False?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
Which of the following is most appropriate with regard to an organization's Business Continuity Planning (BCP) framework?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
You are executing a project and you have come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
You are searching the Internet for some information. After clicking a link on one page, you become suspicious that it may have triggered a virus or something which is wrong. What should be your immediate reaction?
asked
Aug 17, 2023
in
iSecurity
isecurity
0
votes
1
answer
Which of the following is not true about Information classified as Private and confidential?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
You have backed up your project information on media. The project will continue for the next two years. How often should the restorability test be done?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
You are working on a project and require logging on to the environment managed by the client. The client has provided you with a single user ID and your entire team uses the same ID to login to the environment. Which of these statements is correct in this context?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
You were creating some design/flow diagrams on paper for a sensitive project of a client. when suddenly the PL calls you for an urgent meeting in a meeting room which is outside the Offshore Development Center (ODC). What is the appropriate way to handle the papers?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
Rakesh has been deputed to a client located in the US. The client has provided a laptop to Rakesh. His family resides in India. Every evening he uses the client-provided laptop to chat with his family through a webcam using software he has installed directly from the internet. Which of the following is correct?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
One day when you log on to your e-mail, you find that there is an unsolicited e-mail having abusive and offensive content in your inbox. What should you do?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
What should you do to make your password difficult to guess or crack?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
If you find a person whom you know tailgating, what should you do?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
What is referred to as social engineering?
asked
Aug 17, 2023
in
iSecurity
security
0
votes
1
answer
Writing down passwords is wrong. With respect to this statement, which of the following options is appropriate?
asked
Aug 17, 2023
in
iSecurity
security
Page:
« prev
1
...
32
33
34
35
36
37
38
39
40
41
42
...
187
next »
...