Trending questions in Edureka Community

0 votes
1 answer

What is the use of takeUntil to cancel a subscription?

takeUntil is an RxJS operator used to ...READ MORE

Feb 24, 2025 in Node-js by Navya
810 views
0 votes
0 answers

What methods can you apply to fix contextual drift in language models during dialogue generation?

With the help of code can i ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
548 views
0 votes
1 answer

How do you detect brute force login attempts in Apache logs?

Monitoring Apache web server logs is essential ...READ MORE

Feb 19, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,032 views
0 votes
1 answer

How do you handle nested dynamic routes with React-Router?

Handling Nested Dynamic Routes in React Router ...READ MORE

Feb 24, 2025 in Node-js by Kavya
852 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How do you use DecisionTreeClassifier and visualize the decision tree using Scikit-learn’s plot_tree?

With the help of proper code can ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
547 views
0 votes
0 answers

How do you use forkJoin() for parallel API calls?

can you explain me with the help ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
466 views
0 votes
0 answers

How can you address token misalignment when using pre-trained models for machine translation?

Can you tell me How can you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
542 views
0 votes
1 answer

How do you handle a large amount of data in React?

Handling Large Amounts of Data in React To ...READ MORE

Feb 24, 2025 in Node-js by Kavya
834 views
0 votes
0 answers

How do you fix token prediction anomalies during the training phase of a text-to-image generator?

Can i know How do you fix ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
540 views
0 votes
0 answers

What’s your approach to managing remote teams with limited oversight?

I’m curious about how people manage remote ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
456 views
0 votes
0 answers

What is the first step in using Burp Suite for web application security testing?

Burp Suite is a powerful tool for ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
507 views
+1 vote
2 answers

What tools and features in Power BI Fabric are best suited for visualizing time-series data in a narrative context?

Visual solids: An effective visual would be ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6, 2025 788 views
0 votes
0 answers

How do you implement K-means++ initialization in KMeans clustering using Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
539 views
0 votes
0 answers

How to check integrity of a file in Linux?

I want to verify whether a file ...READ MORE

Feb 26, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
722 views
0 votes
0 answers

What are the key differences between LSTM and GRU when applying them to time series forecasting?

Can i know What are the key ...READ MORE

Feb 24, 2025 in Generative AI by Ashutosh
• 33,350 points
775 views
+1 vote
2 answers

What are some practical examples of how Power BI Copilot can assist with building DAX measures and queries?

Power BI Copilot can make building DAX ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
786 views
0 votes
1 answer

How do you create protected routes in React?

Creating Protected Routes in React (React Router ...READ MORE

Feb 23, 2025 in Node-js by Kavya
855 views
0 votes
0 answers

How do you create buy-in for a project facing internal opposition?

I’m curious about how to create buy-in ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
451 views
0 votes
0 answers

How would you address language ambiguity in generated text using a language model for content generation?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
535 views
0 votes
0 answers

Which improvements does IPv6 provide over the current IP addressing scheme?

IPv6 was introduced to overcome the limitations ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
678 views
0 votes
0 answers

How do you evaluate the AUC-ROC curve for a binary classification model in Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
536 views
0 votes
1 answer

How can you configure routing for a multi-page React application using React-Router?

To configure routing for a multi-page React ...READ MORE

Feb 23, 2025 in Node-js by Kavya
854 views
0 votes
0 answers

Can we apply two pipes together in Angular?

I doubt it. Can we apply two ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
502 views
0 votes
1 answer
0 votes
0 answers

How would you handle a rapid scope expansion by key stakeholders?

What do you do when major stakeholders ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
445 views
0 votes
0 answers

How does a password manager increase security?

Password managers store and generate strong, unique ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
500 views
0 votes
1 answer

How does an attacker escalate privileges via SUID misconfigurations?

In Unix-like operating systems, the Set User ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
930 views
0 votes
1 answer

How to preload a component in Angular?

In Angular, components are not preloaded directly, ...READ MORE

Feb 24, 2025 in Angular by Navya
786 views
0 votes
0 answers

Describe your approach to defining project scope when requirements are not clearly outlined.

When the project requirements aren’t clear from ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
443 views
0 votes
0 answers

How can you prevent bias amplification in text generation models when using biased data sources?

With the help of code can you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
524 views
0 votes
0 answers

How do you manage vendor delays that impact the project timeline?

I'm managing a project, and vendor delays ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
681 views
0 votes
1 answer

How to detect open ports on a web server using Python?

Conducting a security audit to identify open ...READ MORE

Feb 18, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,054 views
0 votes
0 answers

How would you address tokenization errors in a GPT-3 model when generating natural language text?

With the help of code can you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
522 views
0 votes
0 answers

How do you use SVC with RBF kernel for classification on a non-linear dataset in Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
523 views
0 votes
0 answers

How is salting used to increase the security of a user's stored password?

Salting adds a unique random value to ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
490 views
0 votes
1 answer

What is the difference between Hooks and router in React?

Feature Hooks React Router Definition Functions that manage state and side ...READ MORE

Feb 24, 2025 in Node-js by Kavya
823 views
0 votes
0 answers

How to detect unauthorized USB device insertion?

Unauthorized USB devices can pose serious security ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
387 views
0 votes
0 answers

How do you deal with unexpected changes in client personnel?

I'm working on a project, and one ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
673 views
0 votes
1 answer

How would you manage the state between different components of the site?

Method Description Best For Props (Parent to Child) Pass data from ...READ MORE

Feb 24, 2025 in Node-js by Kavya
819 views
0 votes
1 answer

How can you log and inspect request and response headers in Angular?

In Angular, you can log request and ...READ MORE

Feb 25, 2025 in Angular by Navya
740 views
0 votes
0 answers

How to use AI to predict cyber threats using Python?

Machine learning models can analyze network traffic ...READ MORE

Mar 5, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
436 views
+1 vote
1 answer

Why do Power BI visuals created using Python scripts sometimes appear misaligned, and how can this be fixed?

So, while writing a Python script to ...READ MORE

Feb 24, 2025 in Power BI by anonymous
• 36,180 points
729 views
0 votes
0 answers

How do you establish accountability within a cross-functional team?

I’m curious about how you make sure ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
426 views
+1 vote
1 answer

How can I embed Power BI reports into a Xamarin mobile application?

Embedding Power BI reports into a Xamarin ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
558 views
0 votes
0 answers

What techniques resolve length truncation issues when generating long-form text using transformers?

Can you tell me What techniques resolve ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
506 views
0 votes
0 answers

How does network scanning help in security assessments?

Network scanning is used to identify active ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
650 views
0 votes
1 answer

How to use Metasploit to exploit unpatched web applications?

Metasploit is a powerful framework used in ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
907 views