Trending questions in Edureka Community

0 votes
1 answer

What are common false positives in vulnerability scanning?

Vulnerability scanners are essential for identifying potential ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
116 views
0 votes
0 answers

How can I schedule automated data refresh with notification alerts?

How can I schedule automated data refresh ...READ MORE

Apr 16 in Power BI by pooja
• 24,150 points
53 views
0 votes
1 answer

How do you use Configuration Management to track project scope changes?

Configuration Management (CM) manages project artifacts, documents, ...READ MORE

Apr 14 in PMP by Naira
108 views
0 votes
1 answer

What’s the best method for implementing a Change Control Board (CCB) process?

A CCB is a formal organization that ...READ MORE

Apr 14 in PMP by Naira
108 views
0 votes
1 answer

How to bypass tcpwrapped with Nmap scan?

​When conducting network scans with Nmap, encountering ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
543 views
0 votes
1 answer

How do you define and manage lag and lead time in dependency-driven scheduling?

Lag and lead are time differences between ...READ MORE

Apr 14 in PMP by Naira
107 views
0 votes
0 answers

How can you ensure that sensitive data isn’t leaked in a RAG-based chatbot?

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 29,530 points
63 views
0 votes
0 answers

How would you distill a 7B model into a 1.5B model while retaining key capabilities?

May i know How would you distill ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 29,530 points
61 views
0 votes
1 answer

How can spoofing attacks be prevented?

​Spoofing attacks involve impersonating trusted entities to ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
104 views
0 votes
1 answer

How to create an attribute directive that changes element behavior on hover events?

You can follow this example. This directive ...READ MORE

Apr 10 in Java-Script by anonymous
268 views
0 votes
1 answer

How do attackers bypass SNMP security restrictions?

​Attackers can bypass SNMP (Simple Network Management ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
103 views
0 votes
0 answers

How to implement speculative decoding for a multi-turn chatbot using a small draft model.

Can you tell me How to implement ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,540 points
86 views
0 votes
0 answers
0 votes
1 answer

How do you perform S-Curve analysis for project financial performance?

The S-curve analysis measures cumulative cost, effort, ...READ MORE

Apr 14 in PMP by Naira
91 views
0 votes
0 answers

In a chatbot system, how can KV caching be optimized to reduce redundant computations?

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,540 points
78 views
0 votes
0 answers

How would you integrate global and local attention for an optimized summarization model?

Can i know How would you integrate ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,540 points
74 views
0 votes
0 answers
0 votes
0 answers

How would you convert unstructured text data into a structured format for LLM fine-tuning?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,540 points
72 views
0 votes
0 answers

How would you align token embeddings across two different LLMs for cross-model compatibility?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,540 points
69 views
0 votes
0 answers

How would you implement MoE to optimize inference efficiency while keeping model quality high?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,540 points
68 views
0 votes
0 answers

How do I generate real-time dashboards in Monday.com for stakeholder reporting?

I’m trying to build real-time dashboards in ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
98 views
0 votes
0 answers

Write a solution to create a content moderation system using LLamaIndex for social media text.

Can you tell me Write a solution ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 29,530 points
67 views
0 votes
0 answers

Write a script to map the embeddings of two LLMs with different tokenizer vocabularies.

Can i know Write a script to ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 29,530 points
66 views
0 votes
0 answers

Write code to implement stopword filtering for preprocessing text data for LLM tasks.

Can i know Write code to implement ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,540 points
62 views
0 votes
0 answers

How do you manage cross-functional team calendars in TeamGantt?

We have cross-functional teams using TeamGantt—how do ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
70 views
0 votes
0 answers
0 votes
0 answers

Implement a multi-document summarization tool using LLamaIndex.

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 29,530 points
59 views
0 votes
0 answers

Propose a method to implement a contextual chatbot using LLamaIndex for customer support.

Can you tell me Propose a method ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 29,530 points
59 views
0 votes
0 answers

What is the CVSS base score, and how is it calculated?

The CVSS base score measures the severity ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
69 views
0 votes
0 answers

How would you use LLamaIndex to build a semantic search engine for research papers?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 29,530 points
56 views
0 votes
0 answers

What’s the best way to conduct asynchronous daily standups using Microsoft Teams bots?

I’ve got a distributed team spread across ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
59 views
0 votes
0 answers

Can Asana handle Gantt chart dependencies, or do I need to integrate another tool?

I’m using Asana for project planning and ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
79 views
0 votes
1 answer

How do firewalls detect and block scanning attempts?

​Firewalls play a crucial role in network ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
178 views
0 votes
0 answers

How does idle scanning work in Nmap?

Idle scanning is a stealth technique used ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Anupam
• 17,300 points
85 views
0 votes
1 answer

How to prepare a VAPT report?

​A Vulnerability Assessment and Penetration Testing (VAPT) ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
167 views
0 votes
1 answer

How does Honeypot analysis help detect scanners?

​Honeypots are decoy systems designed to mimic ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
159 views
0 votes
0 answers

What are the risks of IPv6 scanning compared to IPv4 scanning?

IPv6 has a much larger address space ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Nidhi
• 16,540 points
58 views
0 votes
1 answer

How to create a pipe that converts timestamps to relative time strings (e.g., '2 hours ago')?

You can use the date-fns library for ...READ MORE

Apr 10 in Angular by anonymous
187 views
0 votes
1 answer

How do you implement TPU-optimized convolution layers for 3D data?

You can implement TPU-optimized convolution layers for ...READ MORE

Apr 16 in Generative AI by hoor
104 views
0 votes
1 answer

What is CVE, and how does it help in vulnerability tracking?

​Common Vulnerabilities and Exposures (CVE) is a ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
182 views
0 votes
1 answer

How to implement adapter fusion in QLoRA for multi-task learning?

You can implement adapter fusion in QLoRA ...READ MORE

Apr 15 in Generative AI by nidhi
127 views
0 votes
1 answer
0 votes
1 answer

How does AI improve vulnerability detection?

​Artificial Intelligence (AI) significantly enhances vulnerability detection ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
177 views
0 votes
1 answer

How do AI-powered scanners compare with traditional tools?

​AI-powered vulnerability scanners represent a significant advancement ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
130 views
0 votes
1 answer

How do you implement per-core tensor broadcasting in TPU systems?

You can implement per-core tensor broadcasting in ...READ MORE

Apr 16 in Generative AI by simran
99 views
0 votes
1 answer
0 votes
1 answer

How to build a directive that conditionally adds elements to the DOM based on API responses?

Structural Directive with API Condition 1. Create the ...READ MORE

Apr 10 in HTML by anonymous
150 views
0 votes
1 answer

How can you implement static vs. dynamic sharding for TPU datasets?

You can implement static vs dynamic sharding ...READ MORE

Apr 15 in Generative AI by medha
101 views
0 votes
1 answer

Create a pipeline for end-to-end QLoRA fine-tuning using PyTorch Lightning.

You can create an end-to-end QLoRA fine-tuning ...READ MORE

Apr 14 in Generative AI by anonymous
• 29,530 points
127 views