Trending questions in Edureka Community

0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

What’s the risk of weak passwords in network security?

Weak passwords are a major security vulnerability, ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
94 views
0 votes
0 answers

Should pipes implement PipeTransform interface?

Can you help me with a code ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
92 views
0 votes
0 answers
0 votes
0 answers

How do you create a reusable component in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
89 views
0 votes
0 answers

How do you implement KMeans clustering with MiniBatchKMeans for large datasets in Scikit-learn?

Can i know How do you implement ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 28,650 points
122 views
0 votes
0 answers

What is the difference between dependency injection and service in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
88 views
0 votes
0 answers

How to create currency pipe in Angular?

Can you help me with a code ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
88 views
0 votes
0 answers

Why would you use a service in Angular and how is it different from a component?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
87 views
0 votes
0 answers
0 votes
0 answers
+1 vote
2 answers
0 votes
0 answers
+1 vote
2 answers

Can Power BI’s Copilot feature be used to assist with creating paginated reports or is it limited to interactive reports?

Copilot in Power BI creates interactive reports ...READ MORE

Jan 3 in Power BI by pooja
• 23,870 points
165 views
0 votes
0 answers

How to encrypt sensitive data using AES in Python?

AES (Advanced Encryption Standard) is widely used ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
75 views
0 votes
0 answers

How is salting used to increase the security of a user's stored password?

Salting adds a unique random value to ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
78 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How do you implement K-means++ initialization in KMeans clustering using Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,140 points
105 views
0 votes
0 answers

What’s the difference between SSO and federated identity?

Single Sign-On (SSO) and federated identity both ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
73 views
0 votes
1 answer

What are the steps to create and customize a Waterfall chart in Power BI?

A Waterfall chart in Power BI is useful for ...READ MORE

Feb 28 in Power BI by anonymous
• 30,660 points
185 views
+1 vote
2 answers

How can I filter a dataset in Power BI to show records where a date column is less than the slicer value?

Filtering a dataset in Power BI to ...READ MORE

Jan 3 in Power BI by pooja
• 23,870 points
154 views
0 votes
0 answers

How do you address lack of context when generating email responses using large language models?

Can i know How do you address ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,140 points
97 views
0 votes
0 answers
0 votes
0 answers

What’s the difference between Observables and Promises?

With the help of an example, can ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
91 views
0 votes
0 answers

How do you perform feature engineering using PolynomialFeatures in Scikit-learn for regression tasks?

With the help of proper code example ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 28,650 points
97 views
0 votes
1 answer

Why am I getting a 401 Unauthorized error when renaming a Power BI dataflow using the Power BI REST API, and how can I fix it?

A 401 Unauthorized error when renaming a ...READ MORE

Feb 27 in Power BI by anonymous
• 30,660 points
286 views
0 votes
0 answers

How does a password manager increase security?

Password managers store and generate strong, unique ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
64 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How do Identity and Access Management (IAM) systems work?

Identity and Access Management (IAM) systems control ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
62 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer

How do I revert from using refresh policies with an EffectiveDate to using the current date in Tabular Editor 3?

To revert from using EffectiveDate to the ...READ MORE

Feb 28 in Power BI by anonymous
• 30,660 points
175 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

What steps can be taken to fix dead neurons during training of a text generation model?

Can i know What steps can be ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 28,650 points
81 views
0 votes
0 answers
0 votes
0 answers

How do phishing attacks lead to identity theft?

Phishing attacks trick users into revealing sensitive ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 17,140 points
51 views
0 votes
1 answer
0 votes
0 answers

How do you implement L2 regularization to improve SVM classification performance in Scikit-learn?

Can i know How do you implement ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,140 points
82 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers