Trending questions in Edureka Community

0 votes
0 answers

What is the CVSS base score, and how is it calculated?

The CVSS base score measures the severity ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by Anupam
• 16,940 points
38 views
0 votes
0 answers

How do you configure KPI dashboards in Power BI for Project Management?

I’m setting up KPI dashboards in Power ...READ MORE

Apr 15 in PMP by Parshvi
• 7,900 points
32 views
0 votes
0 answers

What’s the best way to conduct asynchronous daily standups using Microsoft Teams bots?

I’ve got a distributed team spread across ...READ MORE

Apr 15 in PMP by Parshvi
• 7,900 points
32 views
0 votes
0 answers

Implement a multi-document summarization tool using LLamaIndex.

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 28,250 points
25 views
0 votes
0 answers

Can Asana handle Gantt chart dependencies, or do I need to integrate another tool?

I’m using Asana for project planning and ...READ MORE

Apr 14 in PMP by Parshvi
• 7,900 points
46 views
0 votes
1 answer

What are the key features of OpenVAS vulnerability scanning?

OpenVAS (Open Vulnerability Assessment System) is an ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
149 views
+1 vote
3 answers

How to auto build a job in jenkins if there is any change in code on Github repository?

To automatically run build on code commit, follow ...READ MORE

Jul 31, 2019 in Jenkins by Sirajul
• 59,230 points
79,920 views
0 votes
0 answers

What are the risks of IPv6 scanning compared to IPv4 scanning?

IPv6 has a much larger address space ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Nidhi
• 16,020 points
33 views
0 votes
0 answers

How does idle scanning work in Nmap?

Idle scanning is a stealth technique used ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Anupam
• 16,940 points
39 views
0 votes
1 answer

How to prepare a VAPT report?

​A Vulnerability Assessment and Penetration Testing (VAPT) ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
115 views
0 votes
1 answer

How do firewalls detect and block scanning attempts?

​Firewalls play a crucial role in network ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
104 views
0 votes
1 answer

How does Honeypot analysis help detect scanners?

​Honeypots are decoy systems designed to mimic ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
102 views
0 votes
1 answer

How do you implement TPU-optimized convolution layers for 3D data?

You can implement TPU-optimized convolution layers for ...READ MORE

Apr 16 in Generative AI by hoor
56 views
0 votes
1 answer

How to create an attribute directive that changes element behavior on hover events?

You can follow this example. This directive ...READ MORE

Apr 10 in Java-Script by anonymous
133 views
0 votes
1 answer
0 votes
1 answer

How do you implement per-core tensor broadcasting in TPU systems?

You can implement per-core tensor broadcasting in ...READ MORE

Apr 16 in Generative AI by simran
61 views
0 votes
1 answer

How to implement adapter fusion in QLoRA for multi-task learning?

You can implement adapter fusion in QLoRA ...READ MORE

Apr 15 in Generative AI by nidhi
71 views
0 votes
1 answer

How do AI-powered scanners compare with traditional tools?

​AI-powered vulnerability scanners represent a significant advancement ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
81 views
0 votes
1 answer

How to create a pipe that converts timestamps to relative time strings (e.g., '2 hours ago')?

You can use the date-fns library for ...READ MORE

Apr 10 in Angular by anonymous
114 views
0 votes
1 answer

How does AI improve vulnerability detection?

​Artificial Intelligence (AI) significantly enhances vulnerability detection ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
120 views
0 votes
1 answer

How can you implement static vs. dynamic sharding for TPU datasets?

You can implement static vs dynamic sharding ...READ MORE

Apr 15 in Generative AI by medha
57 views
0 votes
1 answer
0 votes
1 answer

How to build a directive that conditionally adds elements to the DOM based on API responses?

Structural Directive with API Condition 1. Create the ...READ MORE

Apr 10 in HTML by anonymous
92 views
0 votes
1 answer

Create a function for custom parameter initialization in QLoRA fine-tuning.

You can create a custom parameter initialization ...READ MORE

Apr 14 in Generative AI by anonymous
• 28,250 points
68 views
0 votes
1 answer

How does Metasploit exploit vulnerabilities?

​Metasploit is a powerful open-source framework developed ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
51 views
0 votes
1 answer

How does Nessus perform vulnerability assessments?

​Nessus, developed by Tenable, is a widely ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
51 views
0 votes
1 answer

Write code to quantize activations in a Transformer architecture using QLoRA.

You can quantize activations in a Transformer ...READ MORE

Apr 14 in Generative AI by anonymous
• 28,250 points
66 views
0 votes
1 answer

Create a pipeline for end-to-end QLoRA fine-tuning using PyTorch Lightning.

You can create an end-to-end QLoRA fine-tuning ...READ MORE

Apr 14 in Generative AI by anonymous
• 28,250 points
65 views
0 votes
1 answer

What is CVE, and how does it help in vulnerability tracking?

​Common Vulnerabilities and Exposures (CVE) is a ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
91 views
0 votes
1 answer

How to implement a pipe that capitalizes the first letter of each word in a string?

To create a pipe in Angular that ...READ MORE

Apr 10 in Angular by anonymous
78 views
0 votes
1 answer

How would you perform rank tuning in QLoRA for a large language model?

You can perform rank tuning in QLoRA ...READ MORE

Apr 14 in Generative AI by anonymous
• 28,250 points
58 views
0 votes
1 answer

How to implement a directive that manages focus on dynamically added elements?

To implement a directive that manages focus ...READ MORE

Apr 10 in Angular by anonymous
76 views
0 votes
1 answer

How do you prioritize vulnerabilities in a risk-based approach?

​In a risk-based approach to vulnerability management, ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
82 views
0 votes
1 answer

How to build a directive that listens for specific keyboard shortcuts?

You can use the @HostListener decorator to ...READ MORE

Apr 10 in Angular by anonymous
74 views
0 votes
1 answer

How can One-Shot Learning be used to detect signature forgery with minimal genuine signature samples for training?

You can use One-Shot Learning for signature ...READ MORE

Apr 14 in Generative AI by anonymous
• 28,250 points
54 views
0 votes
1 answer

How to create a structural directive that renders elements based on user permissions?

Here's how to create a structural directive ...READ MORE

Apr 10 in Node-js by anonymous
97 views
0 votes
1 answer

How to develop a pipe that formats phone numbers based on locale?

You can use the libphonenumber-js library for ...READ MORE

Apr 10 in Angular by anonymous
69 views
0 votes
1 answer

How does AI automate enumeration attacks?

​Artificial Intelligence (AI) has revolutionized the landscape ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
73 views
0 votes
1 answer

How to measure the impact of dynamic quantization in QLoRA on large datasets?

You can measure the impact of dynamic ...READ MORE

Apr 14 in Generative AI by anonymous
• 28,250 points
46 views
0 votes
1 answer

Write a script to log validation perplexity during QLoRA training.

You can log validation perplexity during QLoRA ...READ MORE

Apr 14 in Generative AI by anonymous
• 28,250 points
45 views
0 votes
1 answer

How to create a custom directive that integrates with external charting libraries?

Compact Directive for External Chart Integration import { ...READ MORE

Apr 10 in Angular by anonymous
65 views
0 votes
1 answer

How to use host bindings to bind properties to the host element in a component?

In Angular (2+), the @HostBinding() decorator allows ...READ MORE

Apr 10 in Node-js by anonymous
89 views
0 votes
1 answer

How does quantization noise affect model performance in QLoRA-tuned models?

You can analyze how quantization noise affects ...READ MORE

Apr 14 in Generative AI by anonymous
• 28,250 points
43 views
0 votes
1 answer

How to implement a directive that adds tooltips to form controls dynamically?

Custom Tooltip Directive 1. Create the Directive import { ...READ MORE

Apr 10 in Angular by anonymous
62 views
0 votes
1 answer

What are the phases of the vulnerability-management lifecycle?

​The vulnerability management lifecycle is a continuous, ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
68 views
0 votes
1 answer

How to develop a directive that modifies element styles based on form validation status?

Here's a concise directive that automatically applies ...READ MORE

Apr 10 in Angular by anonymous
61 views
0 votes
1 answer

How to dynamically inject components into the DOM using @Component?

You need to use ComponentFactoryResolver and ViewContainerRef. ...READ MORE

Apr 10 in Node-js by anonymous
81 views
0 votes
1 answer

How would you monitor gradient sparsity in QLoRA training?

You can monitor gradient sparsity in QLoRA ...READ MORE

Apr 14 in Generative AI by anonymous
• 28,250 points
35 views
0 votes
1 answer

How to implement a directive that auto-saves form data periodically?

To create a directive that automatically saves ...READ MORE

Apr 10 in Node-js by anonymous
78 views
0 votes
1 answer

How do zero-day vulnerabilities impact security?

​Zero-day vulnerabilities are security flaws in software ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,300 points
59 views