Trending questions in Edureka Community

0 votes
0 answers

When should we use providedIn: ‘root’ vs ‘module’ for services?

I was hoping you could explain to ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
558 views
0 votes
0 answers
0 votes
1 answer

Categorizing Employees Based on Sales Performance

In this classification, one should employ a ...READ MORE

Mar 5, 2025 in Power BI by anonymous
• 36,180 points
480 views
0 votes
0 answers

How do you create a reusable component in Angular?

Can you explain with an example that ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
566 views
0 votes
0 answers

What can you do to improve output fluency when generating text summaries with a language model?

Can i know What can you do ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
597 views
0 votes
0 answers

What are the legal regulations for data protection in networks?

Data protection laws ensure privacy and security ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
516 views
0 votes
0 answers

How do you quickly deploy a honeypot with Kali Linux?

A honeypot is a security mechanism designed ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
464 views
0 votes
2 answers

How do I manage Power BI authentication using OAuth 2.0 in enterprise environments?

Use Azure AD to register an application, ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,245 views
+1 vote
2 answers

How does the Copilot feature in Power BI improve report creation and data analysis workflows for business users?

The Copilot Feature Improves the Entire Workflow ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
843 views
0 votes
0 answers

How can I optimize hyperparameters in a lightGBM model for time-series forecasting?

With the help of proper code example ...READ MORE

Feb 22, 2025 in Generative AI by Nidhi
• 16,260 points
872 views
0 votes
0 answers

Describe a time when you had to lead a team through a significant change. How did you manage it?

What steps do you take to manage ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
418 views
0 votes
0 answers

How do you prioritize risks in a project with multiple high-impact potential issues?

If a project has multiple high-impact risks, ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
415 views
+1 vote
1 answer

Power BI Retention Policy – How to Implement FIFO? – What’s the best way to set up a basic FIFO (First-In-First-Out) retention policy in Power BI?

Implementing a FIFO (First In, First Out) ...READ MORE

Feb 18, 2025 in Power BI by anonymous
• 36,180 points
1,067 views
0 votes
0 answers

What’s your approach to meeting a sudden reduction in project timeline?

If the project timeline gets cut short ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
504 views
0 votes
0 answers

How do Identity and Access Management (IAM) systems work?

Identity and Access Management (IAM) systems control ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
559 views
+1 vote
1 answer

What are the recommended ways to transfer data from Power BI to DOMO while maintaining performance and data integrity?

There are approaches to efficiently performing the ...READ MORE

Feb 24, 2025 in Power BI by anonymous
• 36,180 points
803 views
0 votes
0 answers

How do you deal with errors in Observables?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
538 views
0 votes
0 answers

Can cybersecurity be automated by AI?

AI is increasingly being integrated into cybersecurity ...READ MORE

Mar 5, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
466 views
0 votes
0 answers

What ways can be used to protect from credential stuffing and automated attacks?

Credential stuffing and automated attacks exploit reused ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
501 views
0 votes
0 answers

What’s the difference between authentication and authorization?

Authentication and authorization are key concepts in ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
670 views
0 votes
0 answers

Describe a time when you failed to identify a critical risk. How did you handle the situation?

Have you ever missed a major risk ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
403 views
0 votes
0 answers
+1 vote
1 answer
0 votes
0 answers

How to detect log-based anomalies using Python?

Analyzing logs can help detect unusual activity ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
444 views
+1 vote
1 answer

What could be causing issues when trying to fetch data from Custom Analytics Views in the Azure DevOps API, and how can I resolve them?

When querying Custom Analytics Views in Azure ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
619 views
0 votes
0 answers

How do I utilize Keras Callbacks to implement early stopping during model training?

With the help of python programming can ...READ MORE

Feb 24, 2025 in Generative AI by Ashutosh
• 33,350 points
808 views
0 votes
0 answers

What is the difference between dependency injection and service in Angular?

Can you explain with an example that ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
538 views
0 votes
0 answers

How do you approach risk identification during the planning phase?

What's your process for spotting potential risks ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
401 views
0 votes
0 answers

How to lazy load module after api response in angular?

Can someone exlpain me with the code ...READ MORE

Mar 6, 2025 in Angular by Nidhi
• 16,260 points
448 views
0 votes
0 answers

How do you address risks when resources are below project requirements?

When you’re working on a project and ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
483 views
0 votes
2 answers

What strategies can you use to handle the Power BI Gateway refresh limit?

Optimize Power BI Gateway refresh by using ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 24,450 points
1,755 views
0 votes
0 answers

How do pipes transform data dynamically in Angular?

Can you help me with a code ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
534 views
0 votes
0 answers

Can you explain memory leaks?

With the help of an example and ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
447 views
0 votes
2 answers

How can you partially load data into Power BI Desktop to optimize performance?

Use Power Query filters in Power BI ...READ MORE

Apr 3, 2025 in Power BI by anonymous
• 24,450 points
1,438 views
0 votes
0 answers

How do you manage differing levels of project experience within a team?

I’m wondering how to manage a team ...READ MORE

Mar 4, 2025 in PMP by Parshvi
• 7,940 points
460 views
0 votes
0 answers

How can brute-force attacks compromise password security?

Brute-force attacks systematically try different password combinations ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
534 views
0 votes
0 answers

Should pipes implement PipeTransform interface?

Can you help me with a code ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
532 views
0 votes
1 answer

How can you implement forkJoin for multiple API responses aggregation?

In Angular, forkJoin is used to combine ...READ MORE

Feb 24, 2025 in Node-js by Navya
823 views
0 votes
0 answers

How to encrypt sensitive data using AES in Python?

AES (Advanced Encryption Standard) is widely used ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
528 views
0 votes
1 answer

How to run a scan equivalent to nmap vulnerabilities scan?

Nmap is a versatile network scanning tool ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
962 views
0 votes
0 answers

Describe your approach to managing a remote project team.

What’s your strategy for managing a remote ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
386 views
0 votes
0 answers

How do you prioritize when multiple projects have high ROI potential?

When faced with multiple projects that all ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
470 views
0 votes
0 answers

How would you manage a team member who is consistently underperforming?

How would you handle a team member ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
386 views
0 votes
1 answer
0 votes
1 answer

What is the use case of custom directives in Angular?

Custom directives are used to encapsulate reusable ...READ MORE

Feb 26, 2025 in Angular by Tanya
735 views
0 votes
0 answers

What’s the difference between SSO and federated identity?

Single Sign-On (SSO) and federated identity both ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
521 views
0 votes
0 answers

How would you handle a situation where an identified risk becomes a reality?

If a risk you planned for actually ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
376 views
+1 vote
2 answers

How does Power BI Fabric enhance the presentation of insights compared to traditional Power BI dashboards and reports?

Power BI Fabric presents an enhanced experience ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6, 2025 800 views