Trending questions in Edureka Community

0 votes
0 answers

What is the process for running custom operations on TPUs in TensorFlow?

Can i know What is the process ...READ MORE

Apr 7 in Generative AI by Nidhi
• 16,260 points
250 views
0 votes
0 answers

How would you integrate QLoRA with ONNX Runtime for inference?

With the help of code can i ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 33,350 points
250 views
0 votes
1 answer

How does the Program Evaluation and Review Technique (PERT) improve time estimation accuracy?

PERT is an excellent tool for estimating ...READ MORE

Apr 4 in PMP by Naira
348 views
0 votes
0 answers
0 votes
1 answer

How do I calculate the average time between two events for each customer?

To calculate the average time between two ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
465 views
0 votes
0 answers

How do you implement a cross-replica operation on TPUs?

Can you tell me How do you ...READ MORE

Apr 7 in Generative AI by Nidhi
• 16,260 points
245 views
0 votes
1 answer

How do i upgrade a total in a useState when i edit cell in MUI X Data Grid?

To update a total value stored in ...READ MORE

Apr 2 in Node-js by anonymous
454 views
0 votes
1 answer

How to create a password input field in a form in HTML?

To create a secure password input field ...READ MORE

Apr 4 in Node-js by anonymous
406 views
0 votes
1 answer

why react native project is creating in typescript ? i want app.js

React Native may default to TypeScript based ...READ MORE

Apr 2 in Node-js by anonymous
452 views
0 votes
0 answers

How to validate the generalization gap in QLoRA-adapted models?

Can you tell me How to validate ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 33,350 points
242 views
0 votes
0 answers

How do you integrate Qualys Risk Management with ServiceNow ITBM? W

I’m looking into integrating Qualys Risk Management ...READ MORE

Apr 7 in PMP by Parshvi
• 7,940 points
243 views
0 votes
1 answer

How do you handle residual risks after implementing mitigation strategies?

Even after risk mitigation, some risk remains; ...READ MORE

Apr 4 in PMP by Naira
336 views
0 votes
0 answers

How do you perform on-the-fly data augmentation on TPUs?

With the help of proper code can ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 33,350 points
235 views
0 votes
1 answer

What are the challenges in applying Bayesian inference to risk modeling?

Bayesian inference is powerful for updating risk ...READ MORE

Apr 4 in PMP by Naira
333 views
0 votes
1 answer

How do I optimize a measure that involves multiple nested IF conditions?

To optimize a Power BI measure with ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
449 views
0 votes
1 answer

How would a professional hacker penetrate a computer in a network?

​Penetration testing, often referred to as ethical ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
326 views
0 votes
1 answer

How would you use the TPU profiler to analyze and optimize model performance?

The TPU profiler helps identify bottlenecks and ...READ MORE

Apr 7 in Generative AI by puja
296 views
+1 vote
2 answers
0 votes
1 answer

What’s the reasoning behind blocking specific ports like 10080 on internet browsers?

​Browsers block specific ports, such as 10080, ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
365 views
0 votes
1 answer

How can I schedule data refresh for a Power BI report that connects to an on-prem SQL Server via a gateway?

The following steps will help you schedule ...READ MORE

Mar 24 in Power BI by anonymous
• 36,180 points
783 views
0 votes
0 answers

What is the role of replicated variables in TPU training?

With the help of code can i ...READ MORE

Apr 7 in Generative AI by Nidhi
• 16,260 points
217 views
0 votes
0 answers

What are the benefits of asynchronous execution on TPUs, and how do you enable it?

Can you tell me What are the ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 33,350 points
217 views
0 votes
1 answer

How does dependency determination impact critical path calculations?

Dependencies specify task relationships, and faults in ...READ MORE

Apr 4 in PMP by Naira
313 views
0 votes
1 answer

How long does malware last "in the wild"?

​The duration for which malware remains active ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
361 views
0 votes
1 answer

Does port knocking increase security behind a router?

​Port knocking is a security technique that ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
316 views
0 votes
1 answer

Will calling a set state function with the same value using hooks cause a rerender?

No, calling a setState function with the ...READ MORE

Apr 3 in Node-js by anonymous
399 views
0 votes
1 answer

What certifications do I need to become a Malware Analyst?

Pursuing specialized certifications can significantly enhance your ...READ MORE

Mar 26 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
717 views
0 votes
1 answer

How to protect against backdoors in routers?

Protecting your router from backdoors is crucial ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
311 views
0 votes
1 answer

How to secure my network and system setup?

Securing your network and system setup is ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
305 views
0 votes
0 answers

How would you use generative AI for customer behavior prediction in e-commerce applications?

Can you tell me How would you ...READ MORE

Apr 4 in Generative AI by Nidhi
• 16,260 points
347 views
0 votes
1 answer

How to customize Autocomplete of MUI, in react?

The following approaches are used to customize ...READ MORE

Apr 2 in Node-js by anonymous
414 views
0 votes
1 answer

How is a passkey more secure than the regular email/password with a U2F key?

​Passkeys represent a significant advancement in authentication ...READ MORE

Apr 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
392 views
0 votes
0 answers

How do you manage input partitioning for sequential models on TPUs?

Can i know How do you manage ...READ MORE

Apr 7 in Generative AI by Nidhi
• 16,260 points
201 views
0 votes
1 answer

How do I merge two datasets while ensuring that duplicate rows are handled properly?

To merge two datasets and take care ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
420 views
0 votes
1 answer

How would you augment a dataset to simulate one-shot scenarios while ensuring the embeddings remain consistent?

To simulate one-shot scenarios while keeping embeddings ...READ MORE

Apr 7 in Generative AI by Anila
274 views
0 votes
0 answers
0 votes
1 answer

How to create a sticky left sidebar menu using bootstrap 3?

To create a sticky left sidebar that ...READ MORE

Apr 4 in Node-js by anonymous
359 views
0 votes
1 answer

What techniques are there for preventing radio-signal replay attacks?

​Replay attacks in wireless communications occur when ...READ MORE

Apr 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
385 views
0 votes
1 answer

How sensitive is information on a system's architecture?

​Exposing details about your system's architecture can ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
298 views
0 votes
0 answers

How do generative AI handle rare events in tasks like anomaly detection or fraud detection?

With the help of code can you ...READ MORE

Apr 4 in Generative AI by Ashutosh
• 33,350 points
333 views
0 votes
4 answers

How to print objects of class using print function in Python?

You have to called the built in ...READ MORE

May 12, 2021 in Python by anonymous

edited Mar 5 80,854 views
0 votes
1 answer

What are the security pros and cons of setting up passkeys for Gmail logins?

​Passkeys are an emerging authentication method designed ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
335 views
0 votes
1 answer

How can I create a measure that returns a dynamic title based on applied filters?

To create a dynamic title in Power ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
408 views
+1 vote
1 answer
0 votes
1 answer

What prevents random software installation popups from misinterpreting our consent?

​Operating systems and security measures employ several ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
332 views
0 votes
1 answer

In what scenarios would a fast-tracking vs. crashing technique be preferable?

Two schedule acceleration techniques, each serving different ...READ MORE

Apr 4 in PMP by Naira
282 views
0 votes
1 answer

How to deal with monitoring software on a personal PC used for work?

​Employers implementing monitoring software on personal devices ...READ MORE

Apr 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
368 views
0 votes
0 answers
0 votes
1 answer

Is a "single" CPU safer than multiple cores?

​The number of CPU cores in a ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
281 views