Trending questions in Edureka Community

0 votes
0 answers

How can we protect against packet sniffing?

Packet sniffing allows attackers to capture and ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
596 views
0 votes
0 answers

How do I implement salt into my login for passwords?

Salting enhances password security by adding randomness ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
417 views
0 votes
0 answers

How do you approach risk identification during the planning phase?

What's your process for spotting potential risks ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
326 views
0 votes
0 answers

How do you diagnose an injector fault?

Explain me with the help of an ...READ MORE

Mar 3 in Java-Script by Nidhi
• 16,260 points
450 views
+1 vote
1 answer

How do I set up ADAL authentication for Power BI, and what are the common challenges?

Setting Up ADAL Authentication for Power BI Register ...READ MORE

Feb 28 in Web Development by anonymous
• 36,180 points
543 views
0 votes
0 answers

Describe your approach to managing a remote project team.

What’s your strategy for managing a remote ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
317 views
0 votes
1 answer

How can I calculate the year-over-year percentage change using custom fiscal week numbers in Power BI Desktop?

In Power BI, to evaluate the YoY ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
580 views
0 votes
0 answers

How do you quickly deploy a honeypot with Kali Linux?

A honeypot is a security mechanism designed ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
360 views
0 votes
2 answers

How can Power BI Fabric integrate with other Microsoft tools (like Excel or Teams) to enhance narrative delivery?

When blended with Microsoft tools like Excel ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6 779 views
0 votes
0 answers
0 votes
0 answers

How to use Angular services to share data between components?

Explain me with the help of an ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
440 views
0 votes
0 answers

Can cybersecurity be automated by AI?

AI is increasingly being integrated into cybersecurity ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
368 views
0 votes
1 answer

What is the recommended way to authenticate with the Vertex AI Generative AI API in Google Cloud Functions?

The recommended way to authenticate with the ...READ MORE

Mar 17 in Generative AI by thomos
1,012 views
0 votes
0 answers

When should we use providedIn: ‘root’ vs ‘module’ for services?

I was hoping you could explain to ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
439 views
0 votes
0 answers

How do you manage differing levels of project experience within a team?

I’m wondering how to manage a team ...READ MORE

Mar 4 in PMP by Parshvi
• 7,940 points
378 views
0 votes
1 answer

Automating Monthly Sales Data Consolidation from SharePoint

Power Query has been used to automate ...READ MORE

Mar 5 in Power BI by anonymous
• 36,180 points
363 views
0 votes
0 answers

What’s the difference between BehaviorSubject and Subject?

Explain me with the help of an ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
436 views
0 votes
0 answers

How do you implement L2 regularization to improve SVM classification performance in Scikit-learn?

Can i know How do you implement ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,260 points
482 views
+1 vote
1 answer

Is there a way to track and visualize variable name changes within a group in Power BI, and what DAX techniques can help?

Tracking and Visualizing Variable Name Changes in ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
529 views
0 votes
0 answers

How do you deal with errors in Observables?

With the help of an example, can ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
433 views
+1 vote
1 answer

What are the best practices for using Power BI connectors to monitor user activities and interactions within a dashboard?

Power BI dashboards. Some best practices for ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
696 views
0 votes
0 answers
0 votes
0 answers

How to create currency pipe in Angular?

Can you help me with a code ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
444 views
0 votes
0 answers

Why would you use a service in Angular and how is it different from a component?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
442 views
0 votes
0 answers

What’s your approach to meeting a sudden reduction in project timeline?

If the project timeline gets cut short ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
387 views
0 votes
0 answers

How do you create a reusable component in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
439 views
0 votes
0 answers

What ways can be used to protect from credential stuffing and automated attacks?

Credential stuffing and automated attacks exploit reused ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
391 views
0 votes
0 answers

How would you manage a team member who is consistently underperforming?

How would you handle a team member ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
301 views
0 votes
0 answers

How to lazy load module after api response in angular?

Can someone exlpain me with the code ...READ MORE

Mar 6 in Angular by Nidhi
• 16,260 points
347 views
0 votes
0 answers

Why do we need to unsubscribe from observable?

Can you explain to me with an ...READ MORE

Mar 5 in Angular by Nidhi
• 16,260 points
348 views
0 votes
0 answers

Can you explain memory leaks?

With the help of an example and ...READ MORE

Mar 5 in Angular by Nidhi
• 16,260 points
348 views
0 votes
0 answers

How do pipes transform data dynamically in Angular?

Can you help me with a code ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
434 views
0 votes
0 answers

How do Identity and Access Management (IAM) systems work?

Identity and Access Management (IAM) systems control ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
434 views
0 votes
0 answers

How would you handle a situation where an identified risk becomes a reality?

If a risk you planned for actually ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
289 views
0 votes
0 answers

How to encrypt sensitive data using AES in Python?

AES (Advanced Encryption Standard) is widely used ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
429 views
0 votes
1 answer

What are the steps to create and customize a Waterfall chart in Power BI?

A Waterfall chart in Power BI is useful for ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
547 views
0 votes
1 answer

How to Calculate Dynamic Regional Sales Percentage in DAX?

To compute the percentage of total sales ...READ MORE

Mar 3 in Power BI by anonymous
• 36,180 points
417 views
0 votes
0 answers

What is the difference between dependency injection and service in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
428 views
+1 vote
1 answer

What are the correct steps to set up Power BI with Amazon Redshift using an ODBC driver?

To integrate Power BI with Amazon Redshift ...READ MORE

Feb 27 in Power BI by anonymous
• 36,180 points
610 views
0 votes
1 answer

How to remove components created with Angular-CLI?

To remove components created with Angular CLI, ...READ MORE

Feb 26 in Angular by Navya
639 views
0 votes
0 answers
0 votes
1 answer

How to send multipart/form-data for a file upload in Angular?

In Angular, you can send files using ...READ MORE

Feb 24 in Angular by Navya
715 views
+1 vote
2 answers

How does the Copilot feature in Power BI improve report creation and data analysis workflows for business users?

The Copilot Feature Improves the Entire Workflow ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
702 views
0 votes
0 answers

How do you address risks when resources are below project requirements?

When you’re working on a project and ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
366 views
0 votes
0 answers
0 votes
0 answers

How would you handle a rapid scope expansion by key stakeholders?

What do you do when major stakeholders ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
364 views
0 votes
1 answer

What techniques mitigate catastrophic forgetting in continual Generative AI training?

Techniques like Elastic Weight Consolidation (EWC), Replay ...READ MORE

Mar 17 in Generative AI by dhoni
541 views
0 votes
0 answers

Describe your approach to defining project scope when requirements are not clearly outlined.

When the project requirements aren’t clear from ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
366 views
0 votes
0 answers

What’s your approach to managing remote teams with limited oversight?

I’m curious about how people manage remote ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
362 views