Trending questions in Edureka Community

+1 vote
1 answer

How can I extract a list of used and unused measures and columns from Power BI project folders using Python?

The extracted measures and columns, which represent ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
2,354 views
0 votes
0 answers

Write a Python script to implement a byte pair encoding (BPE) tokenizer from scratch.

With the help of code can i ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,350 points
403 views
0 votes
1 answer

What are the best enumeration countermeasures?

​Enumeration attacks involve malicious actors systematically probing ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
632 views
0 votes
1 answer

How can spoofing attacks be prevented?

​Spoofing attacks involve impersonating trusted entities to ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
458 views
0 votes
1 answer

What’s the best way to track critical chain project management (CCPM) using Smartsheet?

Tracking CCPM with Smartsheet requires some setup, ...READ MORE

Apr 8, 2025 in PMP by Naira
736 views
0 votes
1 answer

How can you embed Agile KPIs into a project dashboard?

Adding Agile Key Performance Indicators (KPIs) to ...READ MORE

Apr 15, 2025 in PMP by Naira
407 views
0 votes
1 answer

Create a function for custom parameter initialization in QLoRA fine-tuning.

You can create a custom parameter initialization ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,350 points
602 views
0 votes
0 answers
0 votes
1 answer

How do I dynamically calculate the first and last transaction date for each customer?

Calculation of the first transaction date and ...READ MORE

Apr 1, 2025 in Power BI by anonymous
• 36,180 points
1,017 views
0 votes
0 answers

How to Implement a flash attention module for a Transformer model in PyTorch.

May i know How to Implement a ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,350 points
397 views
0 votes
1 answer

Implement a multi-GPU inference pipeline for a foundation model using DeepSpeed or TensorParallel.

You can implement a multi-GPU inference pipeline ...READ MORE

Apr 1, 2025 in Generative AI by safak
1,016 views
0 votes
1 answer

How can Monte Carlo simulations be applied for project risk forecasting in @Risk for Excel?

Monte Carlo simulations are one of the ...READ MORE

Apr 8, 2025 in PMP by Naira
733 views
0 votes
1 answer
0 votes
0 answers

Write a Python server that streams LLM responses using WebSockets.

Can you Write a Python server that ...READ MORE

Apr 16, 2025 in Generative AI by Nidhi
• 16,260 points
395 views
0 votes
0 answers
0 votes
1 answer

How to implement a directive that adds tooltips to form controls dynamically?

Custom Tooltip Directive 1. Create the Directive import { ...READ MORE

Apr 10, 2025 in Angular by anonymous
618 views
0 votes
0 answers

Develop a generative AI system that reviews Python code and suggests optimizations.

Can you tell me Develop a generative ...READ MORE

Apr 16, 2025 in Generative AI by Nidhi
• 16,260 points
390 views
0 votes
1 answer

How do you generate real-time project analytics using Google Looker Studio?

Google Looker Studio’s role in lightweight analytics ...READ MORE

Apr 8, 2025 in PMP by Naira
698 views
0 votes
1 answer

How do I reduce the impact of large cardinality fields on performance in Power BI?

Measures to mitigate the extent of performance ...READ MORE

Apr 1, 2025 in Power BI by anonymous
• 36,180 points
992 views
0 votes
1 answer

What are ICMP Echo Requests in host discovery?

​ICMP Echo Requests, commonly known as "ping" ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
745 views
0 votes
1 answer

How does AI-powered host discovery bypass firewalls?

​Traditional host discovery methods, such as ICMP ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
743 views
0 votes
0 answers

How to implement speculative decoding for a multi-turn chatbot using a small draft model.

Can you tell me How to implement ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
426 views
0 votes
2 answers

How do you mitigate the risks associated with schedule compression techniques?

Fast-tracking and crashing can help you advance ...READ MORE

Apr 4, 2025 in PMP by Naira
825 views
0 votes
1 answer

How to create a directive that validates input fields based on regex patterns?

You can define a custom directive that ...READ MORE

Apr 10, 2025 in Node-js by anonymous
627 views
0 votes
1 answer

How do I convert semi-structured Excel files into a relational format for Power BI?

For semi-structured Excel files that have to ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
691 views
0 votes
1 answer

How do I configure Power BI Service to use DirectQuery efficiently?

In order to optimize DirectQuery in the ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
680 views
0 votes
1 answer

How can I create a Power BI heatmap that dynamically adjusts based on filters?

Filters can dynamically affect the Power BI ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
689 views
0 votes
1 answer

What are the best use cases for AI-powered chatbots in Project Portfolio Management (PPM)?

AI chatbots may be a useful digital ...READ MORE

Apr 8, 2025 in PMP by Naira
686 views
0 votes
1 answer

How can I use parameters to control API calls dynamically in Power Query?

Power Query can manage API calls dynamically ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
687 views
0 votes
0 answers

What are the best practices for deploying TPU-trained models to production systems?

Can you explian to me What are ...READ MORE

Apr 8, 2025 in Generative AI by Ashutosh
• 33,350 points
726 views
0 votes
0 answers

In a chatbot system, how can KV caching be optimized to reduce redundant computations?

With the help of code can i ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
417 views
0 votes
1 answer

What is the role of NetBIOS enumeration in cyberattacks?

​NetBIOS (Network Basic Input/Output System) enumeration is ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
688 views
0 votes
1 answer

How does Nessus perform vulnerability assessments?

​Nessus, developed by Tenable, is a widely ...READ MORE

Apr 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
558 views
0 votes
0 answers

How to return a 401 authentication error from a Flask API?

A 401 status code is used to ...READ MORE

Mar 5, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
2,155 views
0 votes
1 answer

What are the best practices to avoid my server being port scanned?

​Port scanning is a technique used by ...READ MORE

Apr 4, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
859 views
0 votes
1 answer

How to implement grid layouts with nested columns in jQuery Mobile?

The most effective way to implement nested ...READ MORE

Apr 7, 2025 in Node-js by anonymous
720 views
0 votes
1 answer

How to manage component lifecycle hooks for resource cleanup?

You manage component lifecycle hooks—especially ngOnDestroy()—to perform ...READ MORE

Apr 10, 2025 in Node-js by anonymous
614 views
0 votes
1 answer

How to develop a directive that restricts user input based on custom conditions?

To create an Angular directive that restricts ...READ MORE

Apr 10, 2025 in Node-js by anonymous
613 views
0 votes
0 answers

How would you convert unstructured text data into a structured format for LLM fine-tuning?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
409 views
0 votes
0 answers

Modify a Hugging Face generate() function to improve real-time token streaming speed.

Can i know Modify a Hugging Face ...READ MORE

Apr 16, 2025 in Generative AI by Nidhi
• 16,260 points
362 views
0 votes
1 answer

What’s the best way to track sprint velocity trends using Domo?

Domo's approach to sprint velocity tracking allows ...READ MORE

Apr 8, 2025 in PMP by Naira
670 views
0 votes
0 answers

How would you prevent unauthorized prompt injections in an API-based LLM service?

With the help of proper code example ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,350 points
371 views
0 votes
1 answer

How to handle form submissions asynchronously in jQuery Mobile applications?

To effectively manage asynchronous form submissions in ...READ MORE

Apr 7, 2025 in Java-Script by anonymous
712 views
0 votes
1 answer

How to create responsive tables using jQuery Mobile?

The most reliable and maintainable method for ...READ MORE

Apr 7, 2025 in Node-js by anonymous
710 views
0 votes
1 answer

Why do I keep getting port scan attacks?

Experiencing frequent port scan alerts can be ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
716 views
0 votes
1 answer

How can I implement workspace security to control report access at a granular level?

To enforce detailed workspace security in Power ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
658 views
0 votes
1 answer

How to develop a directive that modifies element styles based on form validation status?

Here's a concise directive that automatically applies ...READ MORE

Apr 10, 2025 in Angular by anonymous
576 views
0 votes
1 answer

How to customize the default theme in jQuery Mobile CSS Framework?

Manual CSS Overrides Create a custom CSS file ...READ MORE

Apr 7, 2025 in Java-Script by anonymous
703 views
0 votes
1 answer

How does AI automate enumeration attacks?

​Artificial Intelligence (AI) has revolutionized the landscape ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
576 views
0 votes
0 answers

How can reinforcement learning be used to enforce ethical constraints on an AI chatbot?

Can you tell me How can reinforcement ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,350 points
343 views