Trending questions in Edureka Community

0 votes
1 answer

How to create responsive tables using jQuery Mobile?

The most reliable and maintainable method for ...READ MORE

Apr 7, 2025 in Node-js by anonymous
761 views
0 votes
1 answer

Handling Text-Based Date Columns with Errors in Power Query

To correctly transform a text-based date column ...READ MORE

Mar 5, 2025 in Power BI by anonymous
• 36,180 points
2,189 views
0 votes
0 answers

In a chatbot system, how can KV caching be optimized to reduce redundant computations?

With the help of code can i ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
450 views
0 votes
1 answer

How does AI automate enumeration attacks?

​Artificial Intelligence (AI) has revolutionized the landscape ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
631 views
0 votes
1 answer

What role does SMB enumeration play in ransomware attacks?

​Server Message Block (SMB) enumeration is a ...READ MORE

Apr 9, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
673 views
0 votes
1 answer

What’s the best way to track sprint velocity trends using Domo?

Domo's approach to sprint velocity tracking allows ...READ MORE

Apr 8, 2025 in PMP by Naira
706 views
0 votes
1 answer

How can I implement workspace security to control report access at a granular level?

To enforce detailed workspace security in Power ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
702 views
0 votes
1 answer

How to implement a directive that toggles element visibility with animations?

Custom Directive with Angular Animations 1. Define the ...READ MORE

Apr 10, 2025 in Node-js by anonymous
644 views
0 votes
0 answers

Modify a Hugging Face generate() function to improve real-time token streaming speed.

Can i know Modify a Hugging Face ...READ MORE

Apr 16, 2025 in Generative AI by Nidhi
• 16,260 points
394 views
0 votes
0 answers

What are the best practices for deploying TPU-trained models to production systems?

Can you explian to me What are ...READ MORE

Apr 8, 2025 in Generative AI by Ashutosh
• 33,370 points
749 views
0 votes
0 answers

How would you convert unstructured text data into a structured format for LLM fine-tuning?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
440 views
0 votes
1 answer

How can you implement static vs. dynamic sharding for TPU datasets?

You can implement static vs dynamic sharding ...READ MORE

Apr 15, 2025 in Generative AI by medha
570 views
0 votes
1 answer

How to develop a directive that modifies element styles based on form validation status?

Here's a concise directive that automatically applies ...READ MORE

Apr 10, 2025 in Angular by anonymous
612 views
0 votes
0 answers

How would you prevent unauthorized prompt injections in an API-based LLM service?

With the help of proper code example ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
396 views
0 votes
0 answers

How to create closable tabs in jQuery UI Tabs?

Can i know How to create closable ...READ MORE

Apr 7, 2025 in Java-Script by Ashutosh
• 33,370 points
782 views
0 votes
1 answer

How do you set up custom report automation in Smartsheet Control Center?

Smartsheet Control Center plays a significant role ...READ MORE

Apr 8, 2025 in PMP by Naira
689 views
0 votes
1 answer

Write code to quantize activations in a Transformer architecture using QLoRA.

You can quantize activations in a Transformer ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,370 points
582 views
0 votes
1 answer

How can I apply different transformations to different subsets of data in Power Query?

Different transformations can be applied to a ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
692 views
0 votes
0 answers

How would you distill a 7B model into a 1.5B model while retaining key capabilities?

May i know How would you distill ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
386 views
0 votes
1 answer

How does blockchain-based immutable logging improve project audit trails?

Blockchain technology excels in circumstances that need ...READ MORE

Apr 8, 2025 in PMP by Naira
722 views
0 votes
1 answer

Does hacking require a lot of math?

​The role of mathematics in hacking and ...READ MORE

Mar 25, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,316 views
0 votes
1 answer

How can One-Shot Learning be used to detect signature forgery with minimal genuine signature samples for training?

You can use One-Shot Learning for signature ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,370 points
577 views
0 votes
0 answers

How can you ensure that sensitive data isn’t leaked in a RAG-based chatbot?

With the help of code can you ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
380 views
0 votes
1 answer

How can LDAP enumeration be used to extract user details?

​Lightweight Directory Access Protocol (LDAP) is widely ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
686 views
0 votes
0 answers

How can reinforcement learning be used to enforce ethical constraints on an AI chatbot?

Can you tell me How can reinforcement ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
369 views
0 votes
1 answer

How does the CVSS scoring system classify vulnerabilities?

​The Common Vulnerability Scoring System (CVSS) is ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
596 views
0 votes
1 answer

what is devops and test devops

test answer here READ MORE

Mar 19, 2025 in ChatGPT by Megha
• 160 points
1,523 views
0 votes
1 answer

How do you prioritize vulnerabilities in a risk-based approach?

​In a risk-based approach to vulnerability management, ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
594 views
0 votes
0 answers

How would you align token embeddings across two different LLMs for cross-model compatibility?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
409 views
0 votes
1 answer

How do you set up automated workload balancing in Asana?

Asana's automated workload balancing ensures that team ...READ MORE

Apr 8, 2025 in PMP by Naira
694 views
0 votes
1 answer

How do you configure KPI dashboards in Power BI for Project Management?

Utilizing Power BI to track KPIs in ...READ MORE

Apr 8, 2025 in PMP by Naira
669 views
0 votes
1 answer

How does IDS detect network scanning?

​Intrusion Detection Systems (IDS) are essential for ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
679 views
0 votes
1 answer

How can GitHub Actions be used for automated Agile reporting in Jira?

GitHub Actions is a powerful workflow automation ...READ MORE

Apr 8, 2025 in PMP by Naira
687 views
0 votes
1 answer

What’s the best way to automate regulatory compliance tracking using GRC tools?

GRC (Governance, Risk, and Compliance) technologies make ...READ MORE

Apr 8, 2025 in PMP by Naira
666 views
0 votes
1 answer

What is the role of event chain methodology (ECM) in dynamic risk management?

Event Chain Methodology (ECM) elevates risk management ...READ MORE

Apr 8, 2025 in PMP by Naira
690 views
0 votes
0 answers

Write code to implement stopword filtering for preprocessing text data for LLM tasks.

Can i know Write code to implement ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
396 views
0 votes
1 answer

How to implement swipe gestures for navigation in jQuery Mobile?

To enable swipe gestures for page navigation ...READ MORE

Apr 7, 2025 in Node-js by anonymous
702 views
0 votes
1 answer

How to measure the impact of dynamic quantization in QLoRA on large datasets?

You can measure the impact of dynamic ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,370 points
552 views
0 votes
1 answer

How to disable weekends in jQuery UI Datepicker selection?

To disable weekends (Saturdays and Sundays) in ...READ MORE

Apr 7, 2025 in Node-js by anonymous
700 views
0 votes
0 answers

Implement a multi-document summarization tool using LLamaIndex.

With the help of code can i ...READ MORE

Apr 15, 2025 in Generative AI by Ashutosh
• 33,370 points
393 views
0 votes
0 answers

How would you design a generative model that self-corrects biased or hallucinated outputs?

With the help of code can you ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
358 views
0 votes
1 answer
0 votes
1 answer

How to Drag/Drop Material-UI Cards

You can use the @dnd-kit/core library, which ...READ MORE

Apr 3, 2025 in Node-js by anonymous
920 views
0 votes
1 answer

How does quantization noise affect model performance in QLoRA-tuned models?

You can analyze how quantization noise affects ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,370 points
548 views
0 votes
0 answers

Can Asana handle Gantt chart dependencies, or do I need to integrate another tool?

I’m using Asana for project planning and ...READ MORE

Apr 14, 2025 in PMP by Parshvi
• 7,940 points
420 views
0 votes
0 answers

How would you implement MoE to optimize inference efficiency while keeping model quality high?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
389 views
+1 vote
1 answer

What are the different ways to integrate Bloomberg data into Power BI, and what challenges should I expect?

Integrating Bloomberg financial data into Power BI ...READ MORE

Feb 27, 2025 in Power BI by anonymous
• 36,180 points
2,396 views
0 votes
0 answers

How would you integrate global and local attention for an optimized summarization model?

Can i know How would you integrate ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
387 views
0 votes
1 answer

How do you implement TPU-optimized convolution layers for 3D data?

You can implement TPU-optimized convolution layers for ...READ MORE

Apr 16, 2025 in Generative AI by hoor
484 views
0 votes
1 answer

How does NTP enumeration help in DDoS attacks?

​Network Time Protocol (NTP) enumeration involves gathering ...READ MORE

Apr 9, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
614 views