Trending questions in Edureka Community

0 votes
1 answer

How can I create a measure that calculates the weighted average of a column dynamically based on slicer selections?

Using SUMX and DIVIDE in DAX, a ...READ MORE

Mar 10 in Power BI by anonymous
• 30,660 points
127 views
0 votes
1 answer

How do you address data sparsity when fine-tuning a text generation model for medical text generation?

Use techniques like data augmentation, transfer learning, ...READ MORE

Mar 11 in Generative AI by nini
85 views
0 votes
1 answer

How do I identify and remove inefficient calculated columns in a Power BI dataset?

Here are the best practices for identifying ...READ MORE

Mar 11 in Power BI by anonymous
• 30,660 points
74 views
+1 vote
2 answers

Is it possible to use both R and Python scripts in the same Power BI report? If so, how do they interact?

It has already been established that one ...READ MORE

Jan 13 in Power BI by pooja
• 23,870 points
145 views
0 votes
1 answer

Where do I find my credentials for using watsonx.ai

To access your IBM watsonx.ai credentials, generate ...READ MORE

Mar 11 in Generative AI by rathi
82 views
0 votes
0 answers

How does VoIP war dialing help in VoIP enumeration?

VoIP war dialing is used to scan ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
70 views
0 votes
1 answer

Convert openAi functions to gemini function calling

You can convert the chatbot from NLTK-based functions ...READ MORE

Mar 11 in Generative AI by minnano nihongo
81 views
0 votes
1 answer
0 votes
1 answer

My Power BI report is slow when using multiple DISTINCTCOUNT() measures—what optimization techniques should I use?

Here are a few ways to tune ...READ MORE

Mar 10 in Power BI by anonymous
• 30,660 points
118 views
0 votes
1 answer
0 votes
1 answer

How do I dynamically switch measures in Power BI based on a slicer selection while maintaining performance?

To dynamically switch between different measures in ...READ MORE

Mar 10 in Power BI by anonymous
• 30,660 points
117 views
0 votes
1 answer

How to build an AI Chatbot from scratch using NLTK?

Use NLTK for natural language processing and ...READ MORE

Mar 11 in Generative AI by nini
76 views
0 votes
1 answer

How can you resolve attribute inconsistency in image translation models for facial feature editing?

Use adversarial losses, perceptual losses, and attribute ...READ MORE

Mar 11 in Generative AI by pawan
76 views
0 votes
1 answer
0 votes
0 answers

What are the risks of LDAP injection in AD environments?

LDAP injection can allow attackers to manipulate ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
67 views
0 votes
0 answers

How does LDAP anonymous binding expose user data?

LDAP anonymous binding allows unrestricted access to ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
67 views
0 votes
1 answer

How to fix Service Unavailable error?

Steps to Fix "Service Unavailable" Error Check Server ...READ MORE

Mar 10 in Node-js by Tanvi
114 views
0 votes
1 answer

HuggingFace tokens for 'model garden' not valid in Google console

Ensure your Hugging Face access token has ...READ MORE

Mar 11 in Generative AI by MLmadhav
72 views
0 votes
0 answers

How does DNS Cache Snooping reveal internal domains?

DNS Cache Snooping allows attackers to check ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
59 views
0 votes
1 answer

How can I use RANKX() in DAX to rank customers within each region while keeping ties properly handled?

The RANKX() function allows you to rank ...READ MORE

Mar 10 in Power BI by anonymous
• 30,660 points
112 views
0 votes
0 answers

How do attackers enumerate NFS exports on a network?

NFS (Network File System) can expose shared ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
60 views
0 votes
0 answers

What techniques reveal NTP server configurations?

Attackers often probe NTP servers for misconfigurations ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
60 views
0 votes
1 answer

I'm Unable to Upload Videos/audios in Google Gemini API 1.5Pro

To upload videos and audios in Google ...READ MORE

Mar 11 in Generative AI by techgil
68 views
0 votes
1 answer

Why is my 503 site temporarily out of service?

Common Causes and Fixes Server Overload: High traffic or ...READ MORE

Mar 10 in Node-js by Tanvi
109 views
0 votes
1 answer

How to build a real-time chat app with react node Socket.IO and HarperDB?

Set Up HarperDB: Create a HarperDB instance (cloud ...READ MORE

Mar 10 in Node-js by Tanvi
109 views
0 votes
0 answers

How does an attacker exploit SNMP v1 for enumeration?

SNMP v1 lacks strong security mechanisms, making ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
59 views
0 votes
1 answer

how to fix http error 503. the service is unavailable?

The HTTP 503 Service Unavailable error indicates ...READ MORE

Mar 10 in Node-js by Tanvi
107 views
0 votes
1 answer

What solutions can reduce training time for large-scale generative models without compromising output quality?

Use techniques like mixed precision training, gradient ...READ MORE

Mar 11 in Generative AI by anupam mishra
66 views
0 votes
0 answers

What tools help identify SNMP community strings?

SNMP community strings act as passwords to ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
57 views
0 votes
1 answer

How do you resolve repetitive token generation in language models for creative writing?

Use techniques like top-k sampling, top-p (nucleus) ...READ MORE

Mar 11 in Generative AI by minato
64 views
0 votes
1 answer

How to Make a Resizable JavaFX Application with Font and Image Size Constraints?

To create a resizable JavaFX application with ...READ MORE

Mar 10 in Java-Script by Tanvi
104 views
0 votes
1 answer

How to pass data from controller to view in asp net?

Methods to Pass Data from Controller to ...READ MORE

Mar 10 in Java-Script by Tanvi
104 views
0 votes
0 answers

What types of attacks and abuse does DNSSEC protect against?

DNSSEC adds cryptographic security to DNS to ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
50 views
0 votes
0 answers

What was/is the purpose of the MONLIST command in NTP?

The MONLIST command in older NTP versions provided ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
53 views
0 votes
0 answers

How is SMTP VRFY/EXPN used for email user enumeration?

SMTP commands like VRFY and EXPN can ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
49 views
0 votes
0 answers

What are the security issues with SMTP?

SMTP was not designed with strong security ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
48 views
0 votes
1 answer

I need to compute a year-over-year (YoY) growth rate but only for months where I have data in both years—how do I do this?

Calculating Year-over-Year (YoY) growth only for those ...READ MORE

Mar 10 in Power BI by anonymous
• 30,660 points
99 views
0 votes
1 answer

How do I handle many-to-many relationships in Power BI without creating ambiguous relationships in the model?

Best practices concerning model management should be ...READ MORE

Mar 10 in Power BI by anonymous
• 30,660 points
99 views
0 votes
1 answer

How do you use L1 regularization with Logistic Regression in Scikit-learn for feature selection?

You can use L1 regularization with LogisticRegression ...READ MORE

Mar 18 in Generative AI by anonymous
• 28,650 points
88 views
0 votes
1 answer

How to handle asynchronous actions in Redux with Redux-Saga for complex data fetching scenarios?

To handle asynchronous actions in Redux for ...READ MORE

Mar 10 in Node-js by Tanvi
91 views
0 votes
0 answers

What countermeasures prevent NFS share exploitation?

Misconfigured NFS shares can lead to unauthorized ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
39 views
0 votes
1 answer

How can I reduce the memory usage of a complex DAX calculation that involves multiple SUMX() iterations?

To reduce memory usage in a complex ...READ MORE

Mar 10 in Power BI by anonymous
• 30,660 points
87 views
0 votes
1 answer

How can I optimize a SUMX() function that is performing poorly on large datasets?

To optimize a SUMX() function for large ...READ MORE

Mar 10 in Power BI by anonymous
• 30,660 points
84 views
0 votes
0 answers

Describe a situation where you had to take a calculated risk. What was the outcome?

Can you share a time when you ...READ MORE

Mar 11 in PMP by Parshvi
• 7,940 points
73 views
0 votes
0 answers

How do you balance risk mitigation with project constraints like time and budget?

How do you find the right balance ...READ MORE

Mar 11 in PMP by Parshvi
• 7,940 points
72 views
0 votes
1 answer

How to Handle Blocking Threads in a Ruby Chat Server for Server Commands?

To handle blocking threads in a Ruby ...READ MORE

Mar 10 in Node-js by Tanvi
82 views
+1 vote
2 answers

What are the best practices for improving performance when using DirectQuery in Power BI to retrieve data from SQL Server?

For optimization in Power BI while using DirectQuery with SQL Server, best practices include the ...READ MORE

Jan 23 in Power BI by pooja
• 23,870 points
190 views
0 votes
0 answers

What strategies do you use to communicate risks to stakeholders?

How do you communicate risks to stakeholders ...READ MORE

Mar 11 in PMP by Parshvi
• 7,940 points
71 views
0 votes
0 answers

How to simulate a MITM attack using Scapy in Python?

Scapy is a powerful Python library used ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
297 views