Trending questions in Edureka Community

0 votes
0 answers
0 votes
0 answers

How would you fix syntax errors when training a transformer model for code generation tasks?

Can you tell me How would you ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
176 views
0 votes
0 answers

How do you address lack of context when generating email responses using large language models?

Can i know How do you address ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,260 points
174 views
0 votes
0 answers

How do you implement L2 regularization to improve SVM classification performance in Scikit-learn?

Can i know How do you implement ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,260 points
175 views
0 votes
0 answers
+1 vote
1 answer

Is there an automated way to update Power BI Data Model definitions without manually editing data?

Indeed, models of Power BI data can ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
221 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How do you use TfidfVectorizer in Scikit-learn to transform text data for a classification task?

With the help of proper code can ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
169 views
+1 vote
1 answer

How can I retrieve data from a website that is powered by Power BI?

Accessing imported data from a website powered ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
215 views
0 votes
0 answers

How would you resolve underperformance in language models during text generation tasks?

Can you tell me How would you ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
161 views
0 votes
0 answers
+1 vote
1 answer

What is the correct method to switch datasets between Power BI Desktop and Power BI Service?

Switching datasets on Power BI Desktop and ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
203 views
+1 vote
1 answer

How do I configure MuleSoft’s Microsoft Power BI connector with OAuth authentication?

To securely connect MuleSoft to Power BI ...READ MORE

Feb 27 in Power BI by anonymous
• 36,180 points
302 views
0 votes
1 answer

How can I calculate the year-over-year percentage change using custom fiscal week numbers in Power BI Desktop?

In Power BI, to evaluate the YoY ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
238 views
0 votes
1 answer

What techniques mitigate catastrophic forgetting in continual Generative AI training?

Techniques like Elastic Weight Consolidation (EWC), Replay ...READ MORE

Mar 17 in Generative AI by dhoni
237 views
0 votes
0 answers

What’s the difference between authentication and authorization?

Authentication and authorization are key concepts in ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
231 views
0 votes
0 answers

How do you maintain engagement in projects with ambiguous timelines?

Some projects stretch on forever, with shifting ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
227 views
0 votes
0 answers

jhegru ujshdfui ashdiushduiash iudhausdhyis diadh sa

snehbrjdjweh ikdiuw diukhsd iuasyd8s diasdhiasdy iasdiuasyd8iasdyuia sdyiuasydiuays ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by lkijhgf

edited Mar 5 125 views
0 votes
0 answers

How do DDoS attacks disrupt network services?

DDoS attacks flood a network with traffic, ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
225 views
0 votes
0 answers

How is enumeration used to gather information about a target?

Enumeration is a process used in cybersecurity ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
221 views
0 votes
0 answers

How do I apply Cosine Annealing for learning rate scheduling in Keras?

Can i know How do I apply ...READ MORE

Feb 24 in Generative AI by Vani
• 3,580 points
338 views
0 votes
0 answers

How can we protect against packet sniffing?

Packet sniffing allows attackers to capture and ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
219 views
+1 vote
3 answers

Filtering R data-frame with multiple conditions

You can use the 'filter' function from ...READ MORE

Mar 26, 2018 in Data Analytics by Bharani
• 4,660 points
88,009 views
+1 vote
2 answers

How does Power BI Fabric enhance the presentation of insights compared to traditional Power BI dashboards and reports?

Power BI Fabric presents an enhanced experience ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6 359 views
+1 vote
1 answer

What are the correct steps to set up Power BI with Amazon Redshift using an ODBC driver?

To integrate Power BI with Amazon Redshift ...READ MORE

Feb 27 in Power BI by anonymous
• 36,180 points
260 views
0 votes
1 answer

How can I call an API in Power BI when connected through a VPN?

Challenges When Calling an API via VPN Network ...READ MORE

Feb 27 in Power BI by anonymous
• 36,180 points
234 views
0 votes
0 answers

What’s the role of firewalls in network security?

Firewalls act as a barrier between trusted ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
205 views
0 votes
0 answers

What’s the impact of network enumeration on cybersecurity?

Network enumeration can be used by both ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
202 views
0 votes
1 answer

How to send multipart/form-data for a file upload in Angular?

In Angular, you can send files using ...READ MORE

Feb 24 in Angular by Navya
362 views
0 votes
0 answers

What’s your strategy for balancing stakeholder and end-user priorities?

Sometimes, decision-makers push for features or priorities ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
192 views
+1 vote
2 answers

How does the Copilot feature in Power BI improve report creation and data analysis workflows for business users?

The Copilot Feature Improves the Entire Workflow ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
351 views
+1 vote
1 answer

What are common reasons why DirectQuery fails when publishing to Power BI Service, and how can this be resolved?

When publishing to the Power BI Service, ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
319 views
0 votes
0 answers

How would you proceed if you identify a skills gap too late in a project?

You’re deep into a project, and suddenly ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
191 views
0 votes
0 answers

How does a network-based intrusion prevention system secure a network?

A network-based intrusion prevention system (NIPS) monitors ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
190 views
0 votes
0 answers

How do you ensure alignment between business and project objectives?

I’ve seen projects that seem like a ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
189 views
0 votes
0 answers

What are some common network threats and how do they work?

Networks face various security threats, including malware, ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
195 views
0 votes
0 answers

What are the best practices for access control policies?

Effective access control policies ensure that only ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
184 views
0 votes
0 answers

How would you handle a sudden rise in project costs due to market changes?

You planned the budget carefully, but then ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
183 views
0 votes
0 answers

What’s your method for de-escalating project conflicts with external vendors?

Vendor relationships can be tricky. When things ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
183 views
0 votes
0 answers

What security measures protect against MITM attacks?

Man-in-the-Middle (MITM) attacks allow attackers to intercept ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
192 views
+1 vote
2 answers

What tools and features in Power BI Fabric are best suited for visualizing time-series data in a narrative context?

Visual solids: An effective visual would be ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6 340 views
0 votes
1 answer

How do you detect log tampering in a compromised system?

Ensuring the integrity of system logs is ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
487 views
0 votes
0 answers

Which improvements does IPv6 provide over the current IP addressing scheme?

IPv6 was introduced to overcome the limitations ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
229 views
0 votes
0 answers

How do you manage vendor delays that impact the project timeline?

I'm managing a project, and vendor delays ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
244 views
0 votes
1 answer

What is the use case of custom directives in Angular?

Custom directives are used to encapsulate reusable ...READ MORE

Feb 26 in Angular by Tanya
267 views
0 votes
1 answer

How to convert a Fetch API response to RxJS Observable?

To convert a Fetch API response into ...READ MORE

Feb 26 in Node-js by Kavya
265 views