Trending questions in Edureka Community

0 votes
1 answer

How do you handle outlier detection in datasets used for anomaly-based generation?

Outlier detection in datasets for anomaly-based generation ...READ MORE

Dec 31, 2024 in Generative AI by shibin driben
198 views
0 votes
0 answers

How do you give constructive feedback to underperforming team members?

How do you handle situations where a ...READ MORE

Jan 2 in PMP by Hoor
• 4,690 points
132 views
0 votes
1 answer

How do I redirect to a previous page in react?

You can use the useNavigate hook from ...READ MORE

Dec 31, 2024 in Node-js by Navya
201 views
0 votes
1 answer

How can you create an Azure Function to analyze uploaded PDFs using Generative AI?

To create an Azure Function to analyze ...READ MORE

Dec 30, 2024 in Generative AI by neha yadav
216 views
0 votes
0 answers
0 votes
1 answer

What is Jest and react testing library?

They both are tools for testing React ...READ MORE

Dec 31, 2024 in Node-js by Navya
197 views
0 votes
1 answer

How can I control the use of admin tools like IP scanners and PsExec to prevent misuse?

Admin tools like IP scanners and PsExec ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
191 views
0 votes
0 answers

How can I fine-tune a pre-trained CodeGen model on custom data in Vertex AI?

With the help of code, can you ...READ MORE

Dec 30, 2024 in Generative AI by Ashutosh
• 29,730 points
187 views
+1 vote
2 answers

Are there any challenges or limitations when using Power BI Fabric to build data narratives, and how can they be overcome?

Three essential roles will be essential in ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,150 points

edited Mar 6 248 views
0 votes
1 answer

What strategies can I use to limit the impact of HTTP 429 errors on dependent services in a microservice architecture?

In order to limit the impact of ...READ MORE

Nov 28, 2024 in PHP by anupam mishra
1,614 views
0 votes
1 answer

How do you create dynamic embeddings for domain-specific generative tasks?

To create dynamic embeddings for domain-specific generative ...READ MORE

Dec 31, 2024 in Generative AI by shalini guha
178 views
0 votes
1 answer

How do you maintain team morale in challenging projects?

Keeping morale high during tough projects is ...READ MORE

Dec 31, 2024 in PMP by Priya
177 views
0 votes
1 answer

How to efficiently store and query chatbot-specific embeddings in a shared Pinecone index?

To efficiently store and query chatbot-specific embeddings ...READ MORE

Dec 31, 2024 in Generative AI by neha meheta
175 views
0 votes
1 answer

Can I use React testing library without Jest?

While it is possible to use React ...READ MORE

Dec 31, 2024 in Node-js by Navya
181 views
0 votes
1 answer

How do you balance empathy and authority as a project manager?

Balancing empathy and authority requires a thoughtful ...READ MORE

Dec 31, 2024 in PMP by Sufi
189 views
0 votes
1 answer

How can I handle HTTP 429 errors when integrating Generative AI APIs in Spring?

To handle HTTP 429 (Too Many Requests) ...READ MORE

Dec 30, 2024 in Generative AI by techgil
196 views
0 votes
1 answer

What are the relative costs involved in making changes to the current organizational security?

Evaluating the costs associated with enhancing your ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
177 views
0 votes
1 answer

What are the best ways to build trust with clients and stakeholders?

Building trust with clients and stakeholders comes ...READ MORE

Dec 31, 2024 in PMP by Ali
168 views
0 votes
1 answer

How do I add custom JS to react?

Creating custom objects in React involves defining ...READ MORE

Jan 10 in Node-js by Navya
192 views
0 votes
1 answer

Does PCI DSS require an SAQ for each site?

When managing PCI DSS compliance for a ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
171 views
0 votes
1 answer

What is recipient non-repudiation in secure email transport?

Recipient non-repudiation in secure email transport refers ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
171 views
0 votes
1 answer

How do you deal with team burnout in high-pressure projects?

To tackle burnout, I keep an eye ...READ MORE

Dec 31, 2024 in PMP by Anu
177 views
0 votes
1 answer

How to interpret cost comparison for changes in organizational security procedures?

Interpreting a report that compares the costs ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
166 views
0 votes
1 answer

What’s the best way to onboard new team members onto a project?

When onboarding new team members, I start ...READ MORE

Dec 31, 2024 in PMP by Priya
176 views
0 votes
1 answer

Why does HTTPS not support non-repudiation?

HTTPS (Hypertext Transfer Protocol Secure) is designed ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
164 views
0 votes
1 answer

How should a midsized startup approach information security and compliance?

Establishing a robust information security and compliance ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
163 views
0 votes
1 answer

How can you use Grafana templating variables to switch between monitoring labels dynamically in real-time?

To use Grafana templating variables to switch ...READ MORE

Dec 31, 2024 in Generative AI by anil murgan
157 views
0 votes
1 answer

How can specifying task_type improve Vertex AI embeddings in real-time Q&A applications?

Specifying the task type (e.g., "question-answering") when ...READ MORE

Dec 31, 2024 in Generative AI by anupam yadav
155 views
0 votes
1 answer

How can I retrieve search result snippets from a Microsoft Graph API query in a real-time application?

To retrieve search result snippets from a ...READ MORE

Dec 31, 2024 in Generative AI by shri nidhi
151 views
0 votes
1 answer

What’s your go-to method for resolving disputes between team members?

When conflicts arise, I focus on understanding ...READ MORE

Dec 31, 2024 in PMP by Anu
166 views
0 votes
1 answer

What is the difference between non-repudiation and plausible deniability?

Non-repudiation and plausible deniability are two distinct ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
310 views
0 votes
1 answer

How can Google's Gen AI Multi-turn API improve chatbot responses in e-commerce?

Google's Gen AI Multi-turn API can improve ...READ MORE

Dec 30, 2024 in Generative AI by tech boy
173 views
0 votes
1 answer

How to optimize Llama 2 for local AI tasks using only CPU resources?

To optimize Llama 2 for local AI ...READ MORE

Dec 30, 2024 in Generative AI by raju thapa
171 views
0 votes
0 answers
0 votes
1 answer

Why would full disk encryption miss slack space, swap files, and memory?

Full Disk Encryption (FDE) is designed to ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
148 views
0 votes
0 answers

What is the threat model for mobile security when the attacker has root access?

When an attacker gains root access to ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 16,560 points
143 views
0 votes
0 answers

How to prevent lookalike domain phishing and secure client-side code against replication?

We’re concerned about phishing attacks using lookalike ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 16,560 points
143 views
0 votes
1 answer

How do I navigate with useNavigate?

This hook allows the programmer to navigate ...READ MORE

Dec 31, 2024 in Node-js by Navya
136 views
0 votes
0 answers

What’s the purpose of the secret in express-session? How does it mitigate threats?

I’ve noticed that the express-session library requires ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 16,560 points
130 views
0 votes
1 answer

How to integrate Data Lake Gen2 ACL-based access in Azure AI Search for secure indexing?

To integrate Azure Data Lake Gen2 ACL-based ...READ MORE

Dec 30, 2024 in Generative AI by shalini guha
150 views
0 votes
0 answers

How to prevent CSP bypass and resource access from internal servers via code injection?

Our web application implements a Content Security ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 16,560 points
128 views
0 votes
0 answers

How can I safely analyze a USB device?

I’ve come across a suspicious USB device ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 16,560 points
129 views
0 votes
0 answers

How to regain SSH access without alerting a threat actor?

Our server may have been compromised, and ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 16,560 points
117 views
0 votes
1 answer

How can you implement custom schedulers for generative model learning rates?

To implement custom schedulers for learning rates ...READ MORE

Dec 30, 2024 in Generative AI by anupam yadav
128 views
0 votes
1 answer

Does SSL/TLS provide non-repudiation service?

SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
256 views
0 votes
0 answers
0 votes
2 answers

How can I optimize Power BI visuals using bookmarks and buttons for interactive storytelling?

Create Bookmarks: Mark specific visual states or views in the report by ...READ MORE

Jan 23 in Power BI by anonymous
• 24,150 points
530 views
0 votes
0 answers

How do you delegate tasks effectively as a project manager?

Delegating tasks effectively is crucial for project ...READ MORE

Dec 30, 2024 in PMP by Hoor
• 4,690 points
149 views
0 votes
1 answer

What is the difference between authenticity and non-repudiation?

Authenticity and non-repudiation are fundamental concepts in ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
242 views
0 votes
0 answers