Trending questions in Edureka Community

0 votes
0 answers

How do I generate embeddings for dicts (not text) for Vertex AI Search?

Can you tell me How do I ...READ MORE

Feb 13, 2025 in Generative AI by Nidhi
• 16,260 points
478 views
0 votes
0 answers

What challenges arise when using Generative AI for code refactoring tasks?

With the help of proper code examples, ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
511 views
0 votes
0 answers

How can adaptive embedding techniques improve Generative AI for text clustering?

With the help of code examples can ...READ MORE

Feb 12, 2025 in Generative AI by Ashutosh
• 33,350 points
429 views
0 votes
0 answers

What challenges arise in using Generative AI for unstructured data generation?

Can you tell me What challenges arise ...READ MORE

Feb 12, 2025 in Generative AI by Ashutosh
• 33,350 points
467 views
0 votes
1 answer

How do you secure IoT devices?

Securing Internet of Things (IoT) devices is ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
534 views
0 votes
1 answer

How do I transform an array into an object?

Here are some common approaches: Using Array.prototype.reduce(): Example: const array ...READ MORE

Feb 10, 2025 in Node-js by Navya
553 views
0 votes
0 answers
0 votes
2 answers

How would you implement a FIFO data retention policy for a Power BI dataset?

Implement a FIFO data retention policy in ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 24,450 points
866 views
0 votes
1 answer

Why do passwords need to be salted?

Salting is a crucial practice in password ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
634 views
0 votes
1 answer

How can I target the shadow DOM host element only if it’s the last child?

To target the shadow DOM host element ...READ MORE

Feb 10, 2025 in Java-Script by Navya
552 views
0 votes
1 answer

Can a web server be secured with just a firewall?

Relying solely on a firewall to secure ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
584 views
0 votes
0 answers

How can data-centric AI techniques optimize Generative AI for imbalanced data?

Can you tell me how data-centric AI ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
498 views
0 votes
0 answers

What techniques enhance the resilience of Generative AI for noisy inputs?

Can you tell me What techniques enhance ...READ MORE

Feb 12, 2025 in Generative AI by Ashutosh
• 33,350 points
458 views
0 votes
0 answers

How do I use GenAI for creating structured data from unstructured customer feedback?

Can you tell me How do I ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
521 views
0 votes
1 answer

Should the local network be checked first to access IoT devices?

Many Internet of Things (IoT) devices are ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
522 views
0 votes
0 answers

What’s the best approach to build a code generator using GPT models?

With the help of code  can you ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
517 views
0 votes
1 answer

How does V8 differ from ECMAScript standards?

Here's a comparison between V8 and ECMAScript ...READ MORE

Feb 10, 2025 in Node-js by Navya
537 views
0 votes
1 answer

What is the purpose of getters and setters in ECMAScript 6 classes?

Getters and setters are special functions within ...READ MORE

Feb 10, 2025 in Web Development by Navya
536 views
0 votes
0 answers

How does variational inference improve Generative AI for anomaly detection?

With the help of code and examples ...READ MORE

Feb 12, 2025 in Generative AI by Ashutosh
• 33,350 points
439 views
0 votes
1 answer

Can I protect against password hacking just by salting the previous-hash?

Enhancing password security is crucial in safeguarding ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
609 views
0 votes
0 answers

How can I protect my open-source code from misuse or unauthorized generation by AI tools

Can you tell me How can I ...READ MORE

Feb 14, 2025 in Generative AI by Ashutosh
• 33,350 points
354 views
0 votes
1 answer

What is the process to parse JSON using Node.js?

You can parse JSON data using the ...READ MORE

Feb 10, 2025 in Node-js by Navya
523 views
0 votes
1 answer

How do firewalls handle encrypted traffic?

Firewalls play a crucial role in network ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
519 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes, such as Lamport ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
578 views
0 votes
0 answers

How can I resolve an import bug when using Buildzer with Generative AI models?

Can you tell me How can I ...READ MORE

Feb 14, 2025 in Generative AI by Ashutosh
• 33,350 points
384 views
0 votes
0 answers
0 votes
0 answers

What role does hyperparameter search play in optimizing Generative AI pipelines?

With the help of proper code example ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
447 views
0 votes
1 answer

Why use manual testing for web server attacks if scanners can detect vulnerabilities?

While automated security scanners are valuable tools ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
532 views
0 votes
0 answers

What are the trade-offs of using FP16 precision for training Generative AI models?

With the help of code can you ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
468 views
0 votes
1 answer

What are the negative aspects of creating fake security footprints?

Creating fake security footprints, such as misleading ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
490 views
0 votes
2 answers

What steps would you take to optimize a Power BI Desktop connection to a large data warehouse?

Optimize Power BI’s connection to a large ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 24,450 points
797 views
0 votes
0 answers

How do I set up CI/CD pipelines specifically for Generative AI model development?

With the help of code examples, can ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
428 views
0 votes
0 answers

What are the challenges in embedding large contexts in Generative AI for summarization tasks?

Can you tell me What the challenges ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
427 views
0 votes
0 answers

How does zero-shot inference improve Generative AI for unseen tasks?

With the help of code can you ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
427 views
+1 vote
2 answers

How do you control and limit data export options for sensitive Power BI reports?

A balanced combination of the different features ...READ MORE

Nov 22, 2024 in Power BI by pooja
• 24,450 points
1,918 views
0 votes
0 answers

How does regularization scaling impact Generative AI for hierarchical task optimization?

With the help of proper code examples, ...READ MORE

Feb 12, 2025 in Generative AI by Ashutosh
• 33,350 points
385 views
0 votes
0 answers

How can federated learning be used to train Generative AI across distributed datasets?

With the help of code can you ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
448 views
0 votes
1 answer

AADSTS500113: no reply address is registered for the application.

 The error AADSTS500113: no-reply address is registered ...READ MORE

Oct 30, 2024 in Azure by Sweeny
4,978 views
0 votes
0 answers
0 votes
1 answer

How to map a network passively with Wireshark dumps?

Passive network mapping involves analyzing existing network ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
468 views
+1 vote
1 answer

How can I resolve data type mismatch errors when merging datasets in Power BI?

The mismatched data types are often encountered ...READ MORE

Nov 6, 2024 in Power BI by pooja
• 24,450 points
3,346 views
0 votes
0 answers

How to improve word output for hugging face models?

With the help of code, can you ...READ MORE

Feb 14, 2025 in Generative AI by Ashutosh
• 33,350 points
323 views
0 votes
1 answer

Should I allow communication on public networks?

When connecting to public Wi-Fi networks, such ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
453 views
0 votes
0 answers

How do time decay models benefit Generative AI for real-time updates?

Can you tell me how time decay ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
400 views
0 votes
1 answer

How can I filter an array of objects by specific attributes?

You can use the filter() method. The ...READ MORE

Feb 10, 2025 in Java-Script by Navya
449 views
0 votes
1 answer

Does a digital certificate contain a private key?

Digital certificates are fundamental components of public ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
505 views
0 votes
0 answers

testing question for logout case, please dont approve it

testing question for logout case, please dont ...READ MORE

Feb 11, 2025 in Career Counselling by anonymous

edited Mar 5, 2025 429 views