Trending questions in Edureka Community

0 votes
1 answer

What’s the best way to manage dependencies across multiple sprints in JIRA Advanced Roadmaps?

Jira Advanced Roadmaps are one of the ...READ MORE

Apr 15 in PMP by Naira
200 views
0 votes
1 answer

How to use multiple pipes to transform and filter arrays in templates?

Chain multiple pipes in Angular templates by ...READ MORE

Apr 17 in Node-js by anonymous
165 views
0 votes
1 answer

What is the biggest security concern with SNMP?

​The most critical security risk associated with ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
190 views
0 votes
1 answer

What’s the most effective way to manage RAID logs in Notion?

Managing RAID logs (Risks, Assumptions, Issues, and ...READ MORE

Apr 15 in PMP by Naira
198 views
0 votes
1 answer

How can I integrate JIRA with Confluence to streamline Agile project documentation?

Integrating JIRA and Confluence can dramatically improve ...READ MORE

Apr 15 in PMP by Naira
196 views
0 votes
0 answers

How do I add a hyperlink to a tooltip?

Can you tell me How do I ...READ MORE

Apr 17 in Node-js by Ashutosh
• 33,350 points
136 views
0 votes
1 answer

How do you automate retrospective templates in Miro?

Miro is a popular online communication tool ...READ MORE

Apr 15 in PMP by Naira
178 views
0 votes
1 answer

Can I integrate Confluence meeting notes with my JIRA sprints?

Yes, you can link Confluence meeting notes ...READ MORE

Apr 15 in PMP by Naira
178 views
0 votes
1 answer

How to combine DatePipe and CurrencyPipe to display formatted transaction details?

In Angular templates, combine DatePipe and CurrencyPipe ...READ MORE

Apr 16 in Node-js by anonymous
175 views
0 votes
1 answer

Design a workflow to generate context-aware embeddings for legal document indexing in LLamaIndex.

You can generate context-aware embeddings for legal ...READ MORE

Apr 21 in Generative AI by mimi
182 views
0 votes
0 answers
+1 vote
2 answers

Which function can I use to clear the console in R and RStudio ?

Description                   Windows & Linux           Mac Clear console                      Ctrl+L ...READ MORE

Apr 17, 2018 in Data Analytics by anonymous
89,480 views
0 votes
1 answer

How can you extract data using NetBIOS Name Service (NBNS)?

NetBIOS Name Service (NBNS), also known as ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
198 views
0 votes
1 answer

What indicates that a port is closed during a stealth scan?

​In a stealth scan, such as Nmap's ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
198 views
0 votes
1 answer

How does NTP enumeration help in time-based attacks?

​Network Time Protocol (NTP) enumeration can assist ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
182 views
0 votes
1 answer

What’s the difference between burndown and burnup charts in Scrum dashboards?

Burndown and burnup charts are crucial Scrum ...READ MORE

Apr 15 in PMP by Naira
190 views
0 votes
1 answer

What are countermeasures against VoIP enumeration attacks?

To prevent SIP endpoint and extension enumeration ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
180 views
0 votes
1 answer

What is the difference between hping2 and Hping3?

Hping2 vs. Hping3: Key Differences in Features, ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
194 views
0 votes
1 answer

How do you generate dynamic Gantt charts with real-time task dependencies in Smartsheet?

Smartsheet offers dynamic Gantt charts that visually ...READ MORE

Apr 14 in PMP by Naira
216 views
0 votes
1 answer

How can Nmap be used by threat actors?

​Nmap (Network Mapper) is a powerful open-source ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
221 views
0 votes
0 answers

Implement a Python script to connect an LLM with a FAISS-based vector store.

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
160 views
0 votes
1 answer

How does machine learning detect anomalies in port scans?

​Machine learning (ML) models are increasingly employed ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
216 views
0 votes
0 answers

Write a Python script to implement a byte pair encoding (BPE) tokenizer from scratch.

With the help of code can i ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
156 views
0 votes
1 answer

Who are the three main participants in the man in the middle attack?

​In a Man-in-the-Middle (MitM) attack, three primary ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
170 views
0 votes
1 answer

How do you calculate project float manually vs. using a tool?

Project float (or slack) refers to the ...READ MORE

Apr 15 in PMP by Naira
165 views
0 votes
0 answers

How to Implement a 4-bit quantization strategy using bitsandbytes for efficient inference.

Can you tell me How to Implement ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
151 views
0 votes
1 answer

How does active fingerprinting reveal OS details?

Active OS fingerprinting is a technique used ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
182 views
0 votes
1 answer

What role does SPI (Schedule Performance Index) play in forecasting delays?

SPI (timetable Performance Index) is a project ...READ MORE

Apr 15 in PMP by Naira
164 views
0 votes
1 answer

What is active vs passive enumeration, and when is each used?

Active vs. Passive Enumeration: Understanding the Differences ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
210 views
0 votes
0 answers

How to Implement a flash attention module for a Transformer model in PyTorch.

May i know How to Implement a ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
149 views
0 votes
1 answer

How does IP fragmentation work?

​IP fragmentation is a mechanism used in ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
206 views
0 votes
1 answer

How do you integrate Jira Advanced Roadmaps for multi-team backlog planning and dependency tracking?

Jira Advanced Roadmaps (previously Portfolio for Jira) ...READ MORE

Apr 14 in PMP by Naira
202 views
0 votes
1 answer

What’s the impact of Theory of Constraints (TOC) in project bottleneck management?

Eliyahu Goldratt invented the Theory of Constraints ...READ MORE

Apr 14 in PMP by Naira
202 views
0 votes
1 answer

How does AI detect invasive scanning techniques?

AI enhances network security by detecting invasive ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
179 views
0 votes
1 answer

How does MITRE ATT&CK framework help in vulnerability tracking?

The MITRE ATT&CK framework is a comprehensive ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
204 views
0 votes
1 answer

What strategies can you implement for resolving embedding mismatches in LLamaIndex?

You can resolve embedding mismatches in LlamaIndex ...READ MORE

Apr 21 in Generative AI by nimona
158 views
0 votes
0 answers

Write a Python server that streams LLM responses using WebSockets.

Can you Write a Python server that ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
142 views
0 votes
1 answer

How can AI enhance the accuracy of real-time monitoring in IoT networks?

​Artificial Intelligence (AI) significantly enhances the accuracy ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
199 views
0 votes
1 answer

How does AI predict the best scanning method for networks?

Artificial Intelligence (AI) enhances network scanning by ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
197 views
0 votes
0 answers

Develop a generative AI system that reviews Python code and suggests optimizations.

Can you tell me Develop a generative ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
136 views
0 votes
0 answers
0 votes
1 answer

What are common false positives in vulnerability scanning?

Vulnerability scanners are essential for identifying potential ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
196 views
0 votes
1 answer

How do you use Configuration Management to track project scope changes?

Configuration Management (CM) manages project artifacts, documents, ...READ MORE

Apr 14 in PMP by Naira
190 views
0 votes
1 answer

How can attackers exploit IPsec security associations?

​IPsec Security Associations (SAs) are fundamental to ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
151 views
0 votes
1 answer

How can you embed Agile KPIs into a project dashboard?

Adding Agile Key Performance Indicators (KPIs) to ...READ MORE

Apr 15 in PMP by Naira
141 views
0 votes
1 answer

How does AI predict attack vectors in enumeration?

​AI enhances cybersecurity by predicting potential attack ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
193 views
0 votes
1 answer

How do you define and manage lag and lead time in dependency-driven scheduling?

Lag and lead are time differences between ...READ MORE

Apr 14 in PMP by Naira
187 views
0 votes
1 answer

Can you explain three-point estimation with real examples in IT projects?

Three-point estimation is a strategy for estimating ...READ MORE

Apr 15 in PMP by Naira
146 views
0 votes
1 answer

Do firewalls protect against port scanning?

​Yes, firewalls can detect and block port ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
161 views
0 votes
1 answer

What’s the best method for implementing a Change Control Board (CCB) process?

A CCB is a formal organization that ...READ MORE

Apr 14 in PMP by Naira
183 views