Trending questions in Edureka Community

0 votes
1 answer

Calculating Average Customer Purchase Frequency with Unique Customerspo

To accurately calculate the Average Customer Purchase ...READ MORE

Mar 5, 2025 in Power BI by anonymous
• 36,180 points
729 views
0 votes
0 answers

How would you handle a situation where a stakeholder is not satisfied with the project deliverables?

What would you do if a stakeholder ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
499 views
0 votes
1 answer

How do you resolve repetitive token generation in language models for creative writing?

Use techniques like top-k sampling, top-p (nucleus) ...READ MORE

Mar 11, 2025 in Generative AI by minato
468 views
+1 vote
2 answers

Is it possible to extract Power BI metadata (e.g., dataset lineage) using Azure Data Factory?

Yes, you can extract typical metadata from ...READ MORE

Jan 3, 2025 in Power BI by pooja
• 24,450 points
899 views
0 votes
1 answer

GCP Generative AI - How can I refer my existing prompts from python code without sending full prompt contents in each requests?

To reference existing prompts in GCP Generative ...READ MORE

Mar 11, 2025 in Generative AI by chalo chale
465 views
0 votes
1 answer

Your Power BI dataset has millions of rows and is causing memory issues. How can you reduce the dataset size without losing key insights?

Here are a few cutting-edge optimization techniques ...READ MORE

Mar 7, 2025 in Power BI by anonymous
• 36,180 points
625 views
0 votes
0 answers

What tools do you use for project planning and scheduling?

What project planning and scheduling tools do ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
405 views
0 votes
1 answer

How to Handle Blocking Threads in a Ruby Chat Server for Server Commands?

To handle blocking threads in a Ruby ...READ MORE

Mar 10, 2025 in Node-js by Tanvi
503 views
0 votes
0 answers

What strategies do you use to optimize resource utilization?

What’s your go-to approach for making sure ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
404 views
0 votes
0 answers

How do you handle scope creep that threatens the project timeline?

How do you handle scope creep when ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
411 views
0 votes
1 answer
0 votes
1 answer

Why am I unable to update Delta Live Tables, and what troubleshooting steps can I take to resolve the issue?

Well, in the case that you are ...READ MORE

Mar 3, 2025 in Power BI by anonymous
• 36,180 points
790 views
0 votes
1 answer

How to delete a specific question-response pair from a local vector database?

To delete a specific question-response pair from ...READ MORE

Mar 13, 2025 in Generative AI by beginneing
388 views
0 votes
0 answers

How does VoIP war dialing help in VoIP enumeration?

VoIP war dialing is used to scan ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
438 views
0 votes
1 answer

Firestore Integration Issue: Java.lang.VerifyError with WriteResponse after Updating Dependencies

A java.lang.VerifyError with WriteResponse in Firestore often ...READ MORE

Mar 12, 2025 in Generative AI by goblin
403 views
+1 vote
2 answers

Is it possible to create report-level measures in Power BI while using a live query connection to an OLAP cube?

One of the restrictions is that, when ...READ MORE

Jan 13, 2025 in Power BI by pooja
• 24,450 points
742 views
0 votes
0 answers

What’s the importance of sshd’s setting RekeyLimit?

The RekeyLimit setting in SSH controls how ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
436 views
0 votes
1 answer

HuggingFace tokens for 'model garden' not valid in Google console

Ensure your Hugging Face access token has ...READ MORE

Mar 11, 2025 in Generative AI by MLmadhav
445 views
0 votes
1 answer

How does the incognito prop differ from the cacheEnabled prop in React Native WebView?

Prop incognito cacheEnabled Purpose Enables private browsing mode. Controls whether the WebView ...READ MORE

Feb 23, 2025 in Node-js by Kavya
1,158 views
–1 vote
1 answer

How to uncover blacked-out text?

Understanding Redaction Methods Before diving into techniques, it's ...READ MORE

Nov 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
5,018 views
+1 vote
2 answers

How can I keep DAX Studio connection credentials consistent between Power BI and Excel?

Strategies for preserving uniform connection credentials in ...READ MORE

Jan 8, 2025 in Power BI by pooja
• 24,450 points
757 views
0 votes
1 answer
0 votes
0 answers

Describe your approach to managing a project with a tight budget.

How do you manage a project when ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
388 views
+1 vote
2 answers

What are some common mistakes or challenges users face when working with Power BI Copilot, and how can they be avoided?

Separation of a few common hitches with ...READ MORE

Jan 3, 2025 in Power BI by pooja
• 24,450 points
875 views
0 votes
0 answers

How would you handle a situation where the project is behind schedule?

​If a project starts falling behind schedule, ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
387 views
0 votes
1 answer

Why is my 503 site temporarily out of service?

Common Causes and Fixes Server Overload: High traffic or ...READ MORE

Mar 10, 2025 in Node-js by Tanvi
478 views
0 votes
1 answer

What solutions can reduce training time for large-scale generative models without compromising output quality?

Use techniques like mixed precision training, gradient ...READ MORE

Mar 11, 2025 in Generative AI by anupam mishra
434 views
0 votes
0 answers

How to check file integrity in a read-write file system on Linux?

Ensuring file integrity is crucial for security ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
648 views
0 votes
0 answers

When to use switchMap vs concatMap?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
762 views
0 votes
0 answers

What are the impacts of incorrect VPN configurations?

Misconfigured VPNs can lead to security vulnerabilities, ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
416 views
0 votes
0 answers

How do you balance quality requirements with time and budget constraints?

How do you balance delivering high-quality results ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
368 views
0 votes
0 answers

How do you balance risk mitigation with project constraints like time and budget?

How do you find the right balance ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
458 views
0 votes
0 answers

How does an attacker exploit SNMP v1 for enumeration?

SNMP v1 lacks strong security mechanisms, making ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
419 views
0 votes
1 answer

How to cancel HTTP request in Angular 8?

In Angular 8, you can cancel an ...READ MORE

Feb 26, 2025 in Angular by Kavya
985 views
0 votes
0 answers

How do you prioritize project tasks when resources are limited?

When resources are tight, how do you ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
365 views
0 votes
1 answer

Python3 will not import file "apikey.py"

Ensure the file apikey.py is in the ...READ MORE

Mar 11, 2025 in Generative AI by hommie
424 views
0 votes
1 answer

Convert openAi functions to gemini function calling

You can convert the chatbot from NLTK-based functions ...READ MORE

Mar 11, 2025 in Generative AI by minnano nihongo
424 views
0 votes
0 answers

What is the best approach to gathering project requirements from diverse stakeholders?

What’s the best way to gather project ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
361 views
0 votes
0 answers

What steps would you take if a key stakeholder is unresponsive?

How would you deal with a key ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
450 views
0 votes
0 answers

Describe a time when you had to reallocate resources due to budget constraints.

Can you share a time when you ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
361 views
0 votes
0 answers

Describe your approach to implementing quality assurance processes in a project.

How do you build quality assurance into ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
360 views
0 votes
0 answers

Which option can be used to authenticate the IPsec peers during IKE Phase 1?

IKE Phase 1 establishes a secure connection ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
405 views
0 votes
1 answer

What is the difference between active and passive Digital Footprints?

A digital footprint encompasses the trail of ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,686 views
0 votes
0 answers

How do you prioritize stakeholder needs when resources are limited?

When resources are tight, how do you ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
364 views
0 votes
1 answer

Is Page Refresh Necessary for Route Re-Load in ReactJS?

No, a page refresh is not necessary ...READ MORE

Mar 6, 2025 in Java-Script by Anvi
625 views
0 votes
0 answers

Describe your process for conducting a risk assessment for a new project.

How do you approach risk assessment when ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
356 views
0 votes
0 answers

How do you manage stakeholder expectations when project delays are unavoidable?

How do you set realistic stakeholder expectations ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
348 views
+1 vote
2 answers

What processes occur internally in Power BI when a relationship is created between two tables?

When a relationship is created between two ...READ MORE

Jan 23, 2025 in Power BI by pooja
• 24,450 points
550 views
0 votes
0 answers

How do you handle a situation where additional funding is required mid-project?

What would you do if you realized ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
340 views