Trending questions in Edureka Community

0 votes
1 answer

How can I enforce row-level security while allowing self-service reporting?

To implement Row-Level Security (RLS) while allowing ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
401 views
0 votes
1 answer

How can I split a column dynamically into multiple columns based on delimiter count?

Instead of concentrating all those different delimiter-based ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
411 views
0 votes
1 answer

Write a function to normalize embeddings in a One-Shot Learning framework to improve model performance on unseen classes.

Normalizing embeddings ensures uniform vector scales, improving ...READ MORE

Apr 9 in Generative AI by nimantra
477 views
0 votes
1 answer

How do ethical hackers use enumeration during an attack?

​In ethical hacking, enumeration is a critical ...READ MORE

Apr 9 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
368 views
0 votes
1 answer

How does a change control board (CCB) impact project scope management?

A Change Control Board (CCB) acts as ...READ MORE

Apr 4 in PMP by Naira
604 views
0 votes
1 answer

What are the practical applications of chaos theory in complex adaptive project systems?

Chaos theory may seem abstract, but in ...READ MORE

Apr 8 in PMP by Naira
431 views
0 votes
1 answer

How do I efficiently merge multiple Excel files with varying structures?

To efficiently merge multiple Excel files with ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
407 views
0 votes
1 answer

How do I create a report usage log to track which reports are being accessed the most?

To track Power BI report usage effectively, ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
397 views
0 votes
1 answer

What’s the best way to implement project knowledge repositories using Confluence & Notion?

Project knowledge repositories eliminate knowledge silos and ...READ MORE

Apr 8 in PMP by Naira
405 views
0 votes
0 answers
0 votes
1 answer

What’s the role of AI in port scanning detection?

​Port scanning is a technique used to ...READ MORE

Apr 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
451 views
0 votes
1 answer

How do I dynamically calculate the first and last transaction date for each customer?

Calculation of the first transaction date and ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
711 views
0 votes
1 answer

Why is my favicon not working in my next js app?

If your favicon isn’t working in your ...READ MORE

Apr 3 in Node-js by anonymous
664 views
0 votes
1 answer

What’s the best approach for multi-project dependency mapping in Primavera P6?

Managing several projects that share resources or ...READ MORE

Apr 8 in PMP by Naira
426 views
0 votes
1 answer

How to style individual menu items differently in jQuery UI Menu?

To style individual menu items differently in ...READ MORE

Apr 7 in Node-js by anonymous
441 views
0 votes
1 answer

How can I use a disconnected table to drive multiple visual interactions?

Using a disconnected table in Power BI ...READ MORE

Apr 1 in Power BI by Evanjalin
• 36,180 points
703 views
0 votes
1 answer

What are the key components of a project work breakdown structure (WBS)?

A Work Breakdown Structure (WBS) serves as ...READ MORE

Apr 4 in PMP by Naira
594 views
0 votes
1 answer

How to sniff Bluetooth traffic and determine encryption on fitness tracker data?

​Analyzing Bluetooth traffic from fitness trackers can ...READ MORE

Apr 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
655 views
0 votes
1 answer

How can I create a dynamically changing infographic-like report in Power BI?

This would involve smart visual designs, interactivity ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
377 views
0 votes
1 answer

What are the advantages of using geospatial analytics in infrastructure project planning?

Geospatial analytics is not only for maps; ...READ MORE

Apr 8 in PMP by Naira
409 views
0 votes
1 answer

Implement a multi-GPU inference pipeline for a foundation model using DeepSpeed or TensorParallel.

You can implement a multi-GPU inference pipeline ...READ MORE

Apr 1 in Generative AI by safak
690 views
0 votes
1 answer

How do you use JQuery UI menu with ENTER key?

To properly implement ENTER key functionality in ...READ MORE

Apr 7 in Node-js by anonymous
420 views
0 votes
1 answer

What are the challenges in using velocity-based forecasting in Agile projects?

Velocity is useful in estimating future sprint ...READ MORE

Apr 4 in PMP by Naira
549 views
0 votes
1 answer

Why does NFS need security?

​Securing the Network File System (NFS) is ...READ MORE

Apr 9 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
337 views
0 votes
1 answer

What are countermeasures against AI-driven network scans?

​AI-driven network scans leverage artificial intelligence to ...READ MORE

Apr 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
380 views
0 votes
1 answer

How can I create a Power BI dashboard that looks like a KPI scorecard?

To make Power BI scorecards with dashboards ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
367 views
0 votes
0 answers

How to integrate jQuery UI Tabs with AJAX content loading?

Can you explain with the help of ...READ MORE

Apr 7 in Node-js by Ashutosh
• 33,350 points
460 views
0 votes
0 answers

How to create interactive tooltips with links using jQuery UI Tooltip?

Can you tell me how to create ...READ MORE

Apr 7 in Node-js by Ashutosh
• 33,350 points
459 views
0 votes
1 answer

How do you handle incremental vs. iterative development in Agile execution?

Both incremental and iterative development involve delivering ...READ MORE

Apr 4 in PMP by Naira
543 views
0 votes
0 answers

Design a plugin system for adding external APIs to LLamaIndex workflows.

Can i know Design a plugin system ...READ MORE

Apr 9 in Generative AI by Ashutosh
• 33,350 points
372 views
0 votes
1 answer

How do your services protect against common cyber threats?

​Protecting against common cyber threats requires a ...READ MORE

Apr 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
376 views
0 votes
1 answer

Will calling a set state function with the same value using hooks cause a rerender?

No, calling a setState function with the ...READ MORE

Apr 3 in Node-js by anonymous
630 views
0 votes
0 answers

What are fuzzing techniques in vulnerability research?

Fuzzing involves sending random or malformed inputs ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
281 views
0 votes
1 answer

What are the constraints when using critical path method (CPM) in schedule optimization?

CPM is useful for determining the longest ...READ MORE

Apr 4 in PMP by Naira
536 views
0 votes
0 answers

Implement a solution to fetch and index RSS feed data for news classification in LLamaIndex.

Can I know how to implement a ...READ MORE

Apr 8 in Generative AI by Ashutosh
• 33,350 points
404 views
0 votes
1 answer

How do you know that a port being scanned is open?

Port scanners determine the status of a ...READ MORE

Apr 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
407 views
0 votes
4 answers

How to print objects of class using print function in Python?

You have to called the built in ...READ MORE

May 12, 2021 in Python by anonymous

edited Mar 5 81,098 views
0 votes
1 answer

How can generative AI models help in augmenting training data for detection tasks in computer vision?

Generative AI models can synthesize realistic, labeled ...READ MORE

Apr 8 in Generative AI by rashmi
447 views
0 votes
1 answer
0 votes
1 answer

How does story mapping improve backlog refinement?

Story mapping is a visual strategy that ...READ MORE

Apr 4 in PMP by Naira
519 views
0 votes
0 answers

What is banner grabbing, and how does it reveal OS details?

Banner grabbing collects information from service responses. ...READ MORE

Apr 8 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
388 views
0 votes
1 answer

How do swarm intelligence techniques improve distributed team task assignment?

Swarm intelligence resembles nature—consider how ants locate ...READ MORE

Apr 8 in PMP by Naira
366 views
0 votes
0 answers

How to implement a time picker alongside jQuery UI Datepicker?

Can you explian to me How to ...READ MORE

Apr 7 in Node-js by Nidhi
• 16,260 points
427 views
0 votes
1 answer

How to make the move the checkbox to second column in case of MUI X DataGridPro tree view?

You need to customize the column configuration ...READ MORE

Apr 2 in Node-js by anonymous
624 views
0 votes
0 answers

How do you configure risk registers with Monte Carlo simulations in RiskWatch?

I’ve been exploring RiskWatch and want to ...READ MORE

Apr 8 in PMP by Parshvi
• 7,940 points
379 views
0 votes
1 answer

What are the Typescript types for React checkbox events and handlers, or how do I define them?

In TypeScript, handling checkbox events in React ...READ MORE

Feb 22 in Node-js by Kavya
2,311 views
+1 vote
2 answers
0 votes
1 answer

Write a function to extract feature embeddings from a pre-trained ResNet model for One-Shot Learning.

Feature embeddings from a pre-trained ResNet model ...READ MORE

Apr 9 in Generative AI by vashnavi
405 views
0 votes
0 answers

how to remain in a last selected tab on page refresh

Can i know how to remain in ...READ MORE

Apr 7 in Node-js by Ashutosh
• 33,350 points
420 views
0 votes
1 answer

How do I use tooltips effectively to improve user interaction?

In Power BI, field-based tooltips and report ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
320 views