Trending questions in Edureka Community

0 votes
1 answer

How to develop a directive that modifies element styles based on form validation status?

Here's a concise directive that automatically applies ...READ MORE

Apr 10 in Angular by anonymous
467 views
0 votes
0 answers

Selenium Project : Support

Hi I have knowledge in Selenium and ...READ MORE

Apr 9 in Selenium by RICHA
• 140 points
569 views
0 votes
0 answers
0 votes
1 answer

How to implement a directive that adds tooltips to form controls dynamically?

Custom Tooltip Directive 1. Create the Directive import { ...READ MORE

Apr 10 in Angular by anonymous
466 views
0 votes
0 answers

How can you ensure that sensitive data isn’t leaked in a RAG-based chatbot?

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
253 views
0 votes
1 answer

How to implement a directive that toggles element visibility with animations?

Custom Directive with Angular Animations 1. Define the ...READ MORE

Apr 10 in Node-js by anonymous
489 views
0 votes
1 answer

How do you set up Slack-based project alerts for real-time updates in ClickUp?

When set for action-based notifications, ClickUp and ...READ MORE

Apr 8 in PMP by Naira
551 views
0 votes
0 answers

How can I schedule automated data refresh with notification alerts?

How can I schedule automated data refresh ...READ MORE

Apr 16 in Power BI by pooja
• 24,450 points
234 views
0 votes
0 answers

How would you implement MoE to optimize inference efficiency while keeping model quality high?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
281 views
0 votes
1 answer

How do I troubleshoot refresh failures in Power BI Service that don’t occur in Desktop?

The first step in resolving Power BI ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
539 views
0 votes
1 answer

How do you generate real-time project analytics using Google Looker Studio?

Google Looker Studio’s role in lightweight analytics ...READ MORE

Apr 8 in PMP by Naira
541 views
0 votes
1 answer

What are the best enumeration countermeasures?

​Enumeration attacks involve malicious actors systematically probing ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
464 views
0 votes
1 answer

How to create responsive tables using jQuery Mobile?

The most reliable and maintainable method for ...READ MORE

Apr 7 in Node-js by anonymous
583 views
0 votes
1 answer

How to handle form submissions asynchronously in jQuery Mobile applications?

To effectively manage asynchronous form submissions in ...READ MORE

Apr 7 in Java-Script by anonymous
583 views
0 votes
1 answer

How to implement grid layouts with nested columns in jQuery Mobile?

The most effective way to implement nested ...READ MORE

Apr 7 in Node-js by anonymous
580 views
0 votes
0 answers

Can Asana handle Gantt chart dependencies, or do I need to integrate another tool?

I’m using Asana for project planning and ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
303 views
0 votes
1 answer

How does Shodan assist in OS discovery?

​Shodan assists in operating system (OS) discovery ...READ MORE

Apr 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
544 views
0 votes
1 answer

What role does SMB enumeration play in ransomware attacks?

​Server Message Block (SMB) enumeration is a ...READ MORE

Apr 9 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
499 views
0 votes
1 answer

What are the best use cases for AI-powered chatbots in Project Portfolio Management (PPM)?

AI chatbots may be a useful digital ...READ MORE

Apr 8 in PMP by Naira
536 views
0 votes
1 answer

What causes the "Cannot find module '@google/generative-ai/files'" error in TypeScript, and how can I resolve it?

The "Cannot find module '@google/generative-ai'" error in ...READ MORE

Mar 17 in Generative AI by radhika
2,654 views
0 votes
0 answers

Write code to implement stopword filtering for preprocessing text data for LLM tasks.

Can i know Write code to implement ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
268 views
0 votes
0 answers
0 votes
1 answer
0 votes
1 answer

How can I implement workspace security to control report access at a granular level?

To enforce detailed workspace security in Power ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
523 views
0 votes
1 answer
0 votes
0 answers

How do you manage cross-functional team calendars in TeamGantt?

We have cross-functional teams using TeamGantt—how do ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
272 views
0 votes
1 answer

Write code to quantize activations in a Transformer architecture using QLoRA.

You can quantize activations in a Transformer ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
420 views
0 votes
0 answers

Write a solution to create a content moderation system using LLamaIndex for social media text.

Can you tell me Write a solution ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 33,350 points
261 views
0 votes
1 answer

How do you implement TPU-optimized convolution layers for 3D data?

You can implement TPU-optimized convolution layers for ...READ MORE

Apr 16 in Generative AI by hoor
356 views
0 votes
1 answer

How do I configure Power BI Service to use DirectQuery efficiently?

In order to optimize DirectQuery in the ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
516 views
0 votes
1 answer

How do you configure KPI dashboards in Power BI for Project Management?

Utilizing Power BI to track KPIs in ...READ MORE

Apr 8 in PMP by Naira
518 views
0 votes
1 answer

What is the role of NetBIOS enumeration in cyberattacks?

​NetBIOS (Network Basic Input/Output System) enumeration is ...READ MORE

Apr 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
528 views
0 votes
1 answer

How can I combine two unrelated tables in a way that allows for cross-filtering in Power BI?

Cross-filter an unrelated table with another table ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
830 views
+1 vote
2 answers
0 votes
1 answer

How does AI automate enumeration attacks?

​Artificial Intelligence (AI) has revolutionized the landscape ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
440 views
0 votes
0 answers

Implement a multi-document summarization tool using LLamaIndex.

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 33,350 points
252 views
0 votes
1 answer

How do you prioritize vulnerabilities in a risk-based approach?

​In a risk-based approach to vulnerability management, ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
435 views
0 votes
1 answer

How do I convert semi-structured Excel files into a relational format for Power BI?

For semi-structured Excel files that have to ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
519 views
0 votes
1 answer

How does AI-powered host discovery bypass firewalls?

​Traditional host discovery methods, such as ICMP ...READ MORE

Apr 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
563 views
0 votes
0 answers

What’s the best way to conduct asynchronous daily standups using Microsoft Teams bots?

I’ve got a distributed team spread across ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
255 views
+1 vote
1 answer
0 votes
1 answer

What is the role of event chain methodology (ECM) in dynamic risk management?

Event Chain Methodology (ECM) elevates risk management ...READ MORE

Apr 8 in PMP by Naira
539 views
0 votes
1 answer

How can One-Shot Learning be used to detect signature forgery with minimal genuine signature samples for training?

You can use One-Shot Learning for signature ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
406 views
0 votes
1 answer

How can you implement static vs. dynamic sharding for TPU datasets?

You can implement static vs dynamic sharding ...READ MORE

Apr 15 in Generative AI by medha
378 views
0 votes
0 answers

Propose a method to implement a contextual chatbot using LLamaIndex for customer support.

Can you tell me Propose a method ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 33,350 points
245 views
0 votes
1 answer

How does blockchain-based immutable logging improve project audit trails?

Blockchain technology excels in circumstances that need ...READ MORE

Apr 8 in PMP by Naira
542 views
0 votes
1 answer

How can the Nmap tool be used to evade a firewall/IDS?

​Nmap offers several techniques to help evade ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
676 views