Trending questions in Edureka Community

0 votes
0 answers

Describe a time when you had to manage a project with an unclear goal. How did you proceed?

Have you ever had to manage a ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
138 views
0 votes
0 answers
0 votes
0 answers

What ways can be used to protect from credential stuffing and automated attacks?

Credential stuffing and automated attacks exploit reused ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
141 views
+1 vote
6 answers

What best practices do you follow for data validation and audit trails in Power BI solutions?

Audit trails and data validation play a ...READ MORE

Nov 28, 2024 in Power BI by pooja
• 24,450 points
436 views
0 votes
0 answers

How do you establish accountability within a cross-functional team?

I’m curious about how you make sure ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
134 views
+1 vote
2 answers

How can I filter a dataset in Power BI to show records where a date column is less than the slicer value?

Filtering a dataset in Power BI to ...READ MORE

Jan 3 in Power BI by pooja
• 24,450 points
273 views
0 votes
0 answers

How do you create buy-in for a project facing internal opposition?

I’m curious about how to create buy-in ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
132 views
0 votes
0 answers

What’s the difference between BehaviorSubject and Subject?

Explain me with the help of an ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
172 views
0 votes
0 answers

How do I implement salt into my login for passwords?

Salting enhances password security by adding randomness ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
136 views
0 votes
0 answers

How do you diagnose an injector fault?

Explain me with the help of an ...READ MORE

Mar 3 in Java-Script by Nidhi
• 16,260 points
170 views
0 votes
0 answers

How to use AI to predict cyber threats using Python?

Machine learning models can analyze network traffic ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
138 views
0 votes
0 answers
0 votes
0 answers

What’s the difference between pure and impure pipes?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
180 views
0 votes
0 answers

What are common methods of identity theft in networks?

Identity theft occurs when attackers steal personal ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
181 views
0 votes
0 answers
0 votes
0 answers

How do you ensure that all project requirements are gathered and documented effectively?

What’s your process for making sure all ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
127 views
0 votes
0 answers

What type of operation do RxJS operators allow for observables?

With the help of an example, can ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
161 views
0 votes
0 answers

How do you create a reusable component in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
173 views
0 votes
0 answers

What’s the risk of weak passwords in network security?

Weak passwords are a major security vulnerability, ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
174 views
0 votes
0 answers

How to create currency pipe in Angular?

Can you help me with a code ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
172 views
0 votes
0 answers

How can brute-force attacks compromise password security?

Brute-force attacks systematically try different password combinations ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
173 views
0 votes
1 answer

Why am I unable to set refresh for a web-based anonymous connection in Power BI Server, and how can I resolve it?

Scheduled refresh for web-based data sources that ...READ MORE

Feb 28 in Power BI by anonymous
• 33,070 points
290 views
0 votes
0 answers

How do pipes transform data dynamically in Angular?

Can you help me with a code ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
166 views
0 votes
0 answers

How do you use forkJoin() for parallel API calls?

can you explain me with the help ...READ MORE

Mar 5 in Angular by Nidhi
• 16,260 points
119 views
+1 vote
2 answers

Can Power BI’s Copilot feature be used to assist with creating paginated reports or is it limited to interactive reports?

Copilot in Power BI creates interactive reports ...READ MORE

Jan 3 in Power BI by pooja
• 24,450 points
252 views
0 votes
0 answers

What techniques resolve length truncation issues when generating long-form text using transformers?

Can you tell me What techniques resolve ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,260 points
195 views
0 votes
0 answers

How would you handle a situation where the project scope is continuously changing?

How do you handle a situation where ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
113 views
0 votes
0 answers

How would you prioritize tasks when faced with limited resources and tight deadlines?

How do you prioritize tasks when you're ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
111 views
0 votes
0 answers

What is the difference between dependency injection and service in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
160 views
0 votes
0 answers
0 votes
0 answers

Why would you use a service in Angular and how is it different from a component?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
159 views
0 votes
0 answers

What is the first step in using Burp Suite for web application security testing?

Burp Suite is a powerful tool for ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
157 views
0 votes
0 answers

Can we apply two pipes together in Angular?

I doubt it. Can we apply two ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
159 views
0 votes
0 answers

Describe your approach to defining project scope when requirements are not clearly outlined.

When the project requirements aren’t clear from ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
107 views
0 votes
0 answers
+1 vote
2 answers
0 votes
0 answers

Should pipes implement PipeTransform interface?

Can you help me with a code ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
156 views
0 votes
1 answer

What is the best approach to convert a Date/Time column to a Date data type in Power Query while using DirectQuery from SQL?

For DirectQuery, the best way to convert ...READ MORE

Feb 28 in Power BI by anonymous
• 33,070 points
276 views
0 votes
0 answers
0 votes
1 answer

What are the steps to create and customize a Waterfall chart in Power BI?

A Waterfall chart in Power BI is useful for ...READ MORE

Feb 28 in Power BI by anonymous
• 33,070 points
271 views
0 votes
0 answers

How to pass data from one service to another service in Angular?

Explain me with the help of an ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
141 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How to encrypt sensitive data using AES in Python?

AES (Advanced Encryption Standard) is widely used ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
150 views
0 votes
0 answers

How is salting used to increase the security of a user's stored password?

Salting adds a unique random value to ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
152 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers