Trending questions in Edureka Community

0 votes
0 answers

How to sort a dictionary using key?

Example input: {2:3, 1:89, 4:5, 3:0} Desired output: {1:89, 2:3, ...READ MORE

Sep 4, 2023 in Python by Satyawrat
• 460 points
631 views
0 votes
0 answers

What does %s in a Python format string mean?

For example, in the below code if len(sys.argv) ...READ MORE

Sep 5, 2023 in Python by Satyawrat
• 460 points
604 views
0 votes
0 answers

What is the extension of MS Excel?

Could someone tell me what is the ...READ MORE

Sep 8, 2023 in Others by Satyawrat
• 460 points
468 views
0 votes
0 answers

what is iso in cyber security?

What role does ISO (International Organization for ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 150 views
0 votes
0 answers

what is reactjs used for?

What are the practical applications and use ...READ MORE

Sep 15, 2023 in Java-Script by Edureka
• 12,710 points

edited Mar 5 140 views
0 votes
0 answers

what does a information security analyst do?

"What are the primary responsibilities and daily ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 143 views
0 votes
0 answers

what is threat intelligence in cyber security

What is meant by 'threat intelligence' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
496 views
0 votes
0 answers

what is cyber risk management?

"How does cyber risk management play a ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 139 views
0 votes
0 answers

how to use cyber security?

"How can organizations effectively implement and integrate ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 137 views
0 votes
0 answers

how to protect cyber security?

How can businesses effectively fortify their cybersecurity ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 131 views
0 votes
0 answers

what is cyber crime and how to prevent it?

"What are the key characteristics and categories ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 129 views
0 votes
0 answers
0 votes
0 answers

how long does it take to learn cyber security?

What factors influence the time it takes ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 122 views
0 votes
0 answers

how to start a digital marketing agency?

What steps do I take to start ...READ MORE

Sep 13, 2023 in Digital Marketing by anonymous
• 470 points

edited Mar 5 201 views
0 votes
0 answers

what is information technology security

What is security in information technology, and ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 119 views
0 votes
0 answers

why is cybercrime increasing?

What are the underlying factors and trends ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 114 views
0 votes
0 answers

what is cyberspace in cyber security

What constitutes 'cyberspace' within the realm of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
468 views
0 votes
0 answers

what is snort in cyber security

What is the significance of 'Snort' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
462 views
0 votes
0 answers

How to do PMP certification?

What is the step-by-step process for obtaining ...READ MORE

Sep 15, 2023 in PMP by Saniya
• 3,360 points

edited Mar 5 111 views
0 votes
0 answers

what is internet marketing?

Sep 6, 2023 in Digital Marketing by anonymous
• 470 points
404 views
0 votes
0 answers

why do we need cyber security

I'm now enrolled in a course on ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
455 views
0 votes
0 answers

How to become a certified project manager?

What are the specific steps and requirements ...READ MORE

Sep 15, 2023 in PMP by Saniya
• 3,360 points

edited Mar 5 107 views
0 votes
0 answers

How to remove formula in excel shortcut

What is the Excel shortcut key for ...READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
448 views
0 votes
0 answers

What is function in MS Excel?

What is function in MS Excel? READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
448 views
0 votes
0 answers

How does super() operate in the presence of multiple inheritance? As an example, consider the following:

class First(object): def __init__(self): ...READ MORE

Sep 6, 2023 in Python by Satyawrat
• 460 points
489 views
0 votes
0 answers

what is cia in cyber security

Hi, According to the OSG, privacy and security ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
443 views
0 votes
0 answers

what is pmp certification

Sep 4, 2023 in PMP by Saniya
• 3,360 points
393 views
0 votes
0 answers

Is it okay for general applications to use the RuntimeError exception?

raise RuntimeError('config file is missing host address') I've ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
396 views
0 votes
0 answers

How to get a project management certification?

What are the steps and requirements for ...READ MORE

Sep 13, 2023 in PMP by Saniya
• 3,360 points

edited Mar 5 107 views
0 votes
0 answers

what does cybersecurity do?

What are the functions and goals of ...READ MORE

Sep 12, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 142 views
0 votes
0 answers

how does cyber security works

How does the field of cybersecurity operate, ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
363 views
0 votes
0 answers

what is zero day attack in cyber security?

What exactly is a 'zero-day attack' within ...READ MORE

Sep 12, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 134 views
0 votes
0 answers

what is application security in cyber security?

What does the term 'application security' encompass ...READ MORE

Sep 12, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 133 views
0 votes
0 answers

what is pam in cyber security?

What does the term 'PAM' (Privileged Access ...READ MORE

Sep 12, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 130 views
0 votes
0 answers

What do the python file extensions, .pyc .pyd .pyo stand for?

What do these python file extensions mean? .pyc .pyd .pyo What ...READ MORE

Sep 12, 2023 in Python by Rahul
• 240 points

edited Mar 5 129 views
+1 vote
3 answers

Error: Exception file_put_contents failed to open stream: No such file or directory in Laravel?

Hello, You should typically run the php artisan config:cache command ...READ MORE

Mar 31, 2020 in Laravel by Niroj
• 82,800 points
50,419 views
0 votes
0 answers

what is insider threat in cyber security?

Someone, please clarify the concept of an ...READ MORE

Sep 12, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 113 views
0 votes
0 answers

what do cyber security engineers do?

I work on a cyber engineering team ...READ MORE

Sep 12, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 112 views
0 votes
0 answers

what is cyber security expert?

Who is a cybersecurity expert, and what ...READ MORE

Sep 12, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 110 views
0 votes
1 answer

This application has no explicit mapping for /error

One of the reason this error coccured ...READ MORE

May 2, 2022 in Other DevOps Questions by narikkadan
• 86,360 points
21,647 views
0 votes
0 answers

what is ctf in cyber security?

"What exactly does it mean when people ...READ MORE

Sep 12, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,710 points

edited Mar 5 106 views
0 votes
0 answers

If I want to find the sum of a number's numbers, such as:

Input: 932 Output: 14, which is (9 + 3 + 2) What ...READ MORE

Sep 11, 2023 in Python by Satyawrat
• 460 points

edited Mar 5 147 views
0 votes
0 answers

How to get pmp certification

Sep 4, 2023 in PMP by Saniya
• 3,360 points
415 views
0 votes
0 answers

Python urllib2 login to minecraft.net

I have a doubt. I'm creating a ...READ MORE

Aug 31, 2023 in Python by Edureka
• 220 points
576 views
0 votes
0 answers
0 votes
1 answer

How to return data from Axios API?

Hello @kartik, The issue is that the original axiosTest() function ...READ MORE

Oct 13, 2020 in Node-js by Niroj
• 82,800 points
45,964 views
0 votes
1 answer

How to sum hours and minutes in excel?

Assuming your data is located at [D12:D22] Try this ...READ MORE

Sep 27, 2022 in Others by narikkadan
• 86,360 points
15,118 views
0 votes
0 answers

What do __init__ and self do in Python? [duplicate]

During my Python lectures, I've come across a ...READ MORE

Aug 31, 2023 in Python by Edureka
• 220 points
490 views
0 votes
0 answers

How do I format a date in JavaScript?

How do I format a Javascript Date ...READ MORE

Sep 8, 2023 in Java by Rahul
• 240 points

edited Mar 5 126 views
0 votes
0 answers

Why does my JavaScript code receive a "No 'Access-Control-Allow-Origin' header is present on the requested resource" error, while Postman does not?

This question is about why XMLHttpRequest/fetch/etc. on the ...READ MORE

Sep 8, 2023 in Java by Rahul
• 240 points

edited Mar 5 116 views