Trending questions in Edureka Community

0 votes
0 answers
0 votes
0 answers

How do phishing attacks lead to identity theft?

Phishing attacks trick users into revealing sensitive ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
284 views
0 votes
0 answers

How do you manage team expectations if the project scope is reduced?

How do you keep your team motivated ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
445 views
+1 vote
2 answers

What are some practical examples of how Power BI Copilot can assist with building DAX measures and queries?

Power BI Copilot can make building DAX ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
562 views
0 votes
0 answers
0 votes
1 answer

What steps should I take to resolve a "PERMISSION_DENIED" error in Vertex AI?

A PERMISSION DENIED error in Vertex AI ...READ MORE

Mar 17 in Generative AI by neha
838 views
0 votes
0 answers

How does a password manager increase security?

Password managers store and generate strong, unique ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
279 views
0 votes
1 answer

How to remove components created with Angular-CLI?

To remove components created with Angular CLI, ...READ MORE

Feb 26 in Angular by Navya
489 views
0 votes
1 answer

How do you handle a large amount of data in React?

Handling Large Amounts of Data in React To ...READ MORE

Feb 24 in Node-js by Kavya
596 views
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer

How to pass parameters with react-router?

Passing Parameters with React Router 1. Define a ...READ MORE

Feb 23 in Node-js by Kavya
620 views
0 votes
0 answers

How do you perform feature engineering using PolynomialFeatures in Scikit-learn for regression tasks?

With the help of proper code example ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
302 views
0 votes
0 answers

How would you fix syntax errors when training a transformer model for code generation tasks?

Can you tell me How would you ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
292 views
0 votes
1 answer

How to write a Python script for XSS vulnerability detection?

Detecting Cross-Site Scripting (XSS) vulnerabilities is crucial ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
777 views
0 votes
0 answers

How do you optimize resource allocation in a resource-constrained project?

How do you manage a project when ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
423 views
0 votes
2 answers

How can I ensure the data types in Power Query are maintained when moving to the Power BI Data Model?

Ensure data type consistency by explicitly setting ...READ MORE

Apr 8 in Power BI by anonymous
• 24,450 points
941 views
0 votes
0 answers

What’s your strategy for handling a major data breach during a project?

I'm leading a project, and one of ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
448 views
0 votes
0 answers

How do you handle scenarios where a project faces prolonged resource shortages?

I’m managing a project that’s been dealing ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
448 views
0 votes
0 answers

How do you use TfidfVectorizer in Scikit-learn to transform text data for a classification task?

With the help of proper code can ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
291 views
0 votes
0 answers

How do you address lack of context when generating email responses using large language models?

Can i know How do you address ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,260 points
287 views
+1 vote
1 answer

What are the best practices for using Power BI connectors to monitor user activities and interactions within a dashboard?

Power BI dashboards. Some best practices for ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
506 views
0 votes
0 answers

How would you resolve underperformance in language models during text generation tasks?

Can you tell me How would you ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
287 views
0 votes
1 answer

What is the use of takeUntil to cancel a subscription?

takeUntil is an RxJS operator used to ...READ MORE

Feb 24 in Node-js by Navya
545 views
0 votes
1 answer

How can you configure routing for a multi-page React application using React-Router?

To configure routing for a multi-page React ...READ MORE

Feb 23 in Node-js by Kavya
604 views
0 votes
0 answers
0 votes
0 answers

How do DDoS attacks disrupt network services?

DDoS attacks flood a network with traffic, ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
383 views
0 votes
1 answer

How can I call an API in Power BI when connected through a VPN?

Challenges When Calling an API via VPN Network ...READ MORE

Feb 27 in Power BI by anonymous
• 36,180 points
406 views
0 votes
1 answer

What is the purpose of anti-rollback protection in IoT devices?

Anti-rollback protection is a security feature in ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
851 views
0 votes
0 answers

How does a network-based intrusion prevention system secure a network?

A network-based intrusion prevention system (NIPS) monitors ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
360 views
0 votes
0 answers

How do you resolve conflicts among team members with differing work styles?

I'm managing a team where everyone works ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
428 views
0 votes
1 answer

How can you implement forkJoin for multiple API responses aggregation?

In Angular, forkJoin is used to combine ...READ MORE

Feb 24 in Node-js by Navya
530 views
0 votes
1 answer

How does the @Component directive define Angular components?

The @Component decorator defines a component by ...READ MORE

Feb 26 in Angular by Navya
453 views
0 votes
0 answers

What’s your approach to maintaining transparency in high-risk projects?

I’m managing a high-risk project where things ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
398 views
0 votes
0 answers

How do you maintain engagement in projects with ambiguous timelines?

Some projects stretch on forever, with shifting ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
354 views
0 votes
1 answer

How to preload a component in Angular?

In Angular, components are not preloaded directly, ...READ MORE

Feb 24 in Angular by Navya
524 views
0 votes
1 answer

How would you manage the state between different components of the site?

Method Description Best For Props (Parent to Child) Pass data from ...READ MORE

Feb 24 in Node-js by Kavya
569 views
0 votes
0 answers

How does IP addressing work in computer networks?

IP addresses are used to identify devices ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
404 views
0 votes
0 answers

What’s your strategy for quickly adjusting a project plan in a volatile environment?

How do you handle it when a ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
479 views
0 votes
0 answers
0 votes
0 answers

How would you handle a sudden rise in project costs due to market changes?

You planned the budget carefully, but then ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
348 views
0 votes
1 answer

How would you implement routing in a dynamic Music Store application?

Implementing Routing in a Dynamic Music Store ...READ MORE

Feb 23 in Node-js by Kavya
577 views
0 votes
0 answers

How would you proceed if critical project data became inaccessible?

I've been thinking about how to handle ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
475 views
+1 vote
1 answer

What are the recommended ways to transfer data from Power BI to DOMO while maintaining performance and data integrity?

There are approaches to efficiently performing the ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
474 views
0 votes
0 answers

What are some common network threats and how do they work?

Networks face various security threats, including malware, ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
355 views
+1 vote
1 answer

Importing Bloomberg Data into Power BI – What's the best way to pull Bloomberg data into Power BI? Any working solutions?

Importing Bloomberg data to Power BI, however, ...READ MORE

Feb 11 in Power BI by anonymous
• 24,450 points
1,035 views
0 votes
0 answers

How do you manage vendor delays that impact the project timeline?

I'm managing a project, and vendor delays ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
412 views
+1 vote
2 answers

How do I incorporate storytelling techniques into a Power BI Fabric report to make data more engaging for non-technical audiences?

Three essential roles will be essential in ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
503 views
0 votes
0 answers

What’s the role of firewalls in network security?

Firewalls act as a barrier between trusted ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
352 views