Trending questions in Edureka Community

0 votes
1 answer

How do you model a many-to-many relationship in MongoDB with an example?

In MongoDB, a many-to-many relationship can be ...READ MORE

Feb 23, 2025 in Node-js by Kavya
869 views
0 votes
1 answer

How can we add the style conditionally in Angular?

In Angular, you can add styles conditionally ...READ MORE

Feb 26, 2025 in Angular by Tanya
731 views
0 votes
0 answers

How do you establish accountability within a cross-functional team?

I’m curious about how you make sure ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
461 views
0 votes
0 answers

What techniques resolve length truncation issues when generating long-form text using transformers?

Can you tell me What techniques resolve ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
544 views
0 votes
0 answers

How do you ensure knowledge transfer when a team member is replaced?

What's the best way to handle knowledge ...READ MORE

Feb 25, 2025 in PMP by Parshvi
• 740 points
721 views
0 votes
0 answers

How do you prevent output distortion in GPT-2 models when generating technical articles?

With the help of code can i ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
540 views
0 votes
1 answer

Is it possible to handle React events using the Chrome extension?

Yes, it's possible to handle React events ...READ MORE

Feb 22, 2025 in Node-js by Kavya
924 views
0 votes
0 answers
0 votes
1 answer

How do you embed a document in MongoDB for better performance?

Embedding documents in MongoDB is a common ...READ MORE

Feb 22, 2025 in Node-js by Kavya
919 views
0 votes
1 answer

How can I call an API in Power BI when connected through a VPN?

Challenges When Calling an API via VPN Network ...READ MORE

Feb 27, 2025 in Power BI by anonymous
• 36,180 points
664 views
0 votes
0 answers

What steps can be taken to fix dead neurons during training of a text generation model?

Can i know What steps can be ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,370 points
536 views
0 votes
1 answer

Is WebGL a security concern?

WebGL (Web Graphics Library) is a JavaScript ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,430 views
+1 vote
1 answer

Creating Facet Plots in Power BI? – Is there a way to create facet plots (small multiples) in Power BI? Any workarounds or custom visuals?

Power BI has built-in small multiple functions ...READ MORE

Feb 19, 2025 in Power BI by anonymous
• 36,180 points
968 views
0 votes
2 answers

What options exist for using Power BI without the need for an Azure-based server infrastructure?

You can use Power BI Report Server ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,098 views
0 votes
0 answers
0 votes
0 answers

How can you handle multi-modal input data when training generative models for text and image synthesis?

Can you tell me How can you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
534 views
0 votes
0 answers

How do phishing attacks lead to identity theft?

Phishing attacks trick users into revealing sensitive ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
502 views
0 votes
0 answers

What steps would you take if a project sponsor requests a significant change after the project has been initiated?

If a project sponsor asks for a ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
449 views
0 votes
1 answer

How do you implement routing in a React application?

Implementing Routing in a React Application (React ...READ MORE

Feb 23, 2025 in Node-js by Kavya
850 views
0 votes
0 answers

How do I implement a CNN-LSTM hybrid model for video classification tasks?

Can you tell me How do I ...READ MORE

Feb 24, 2025 in Generative AI by Ashutosh
• 33,370 points
768 views
0 votes
0 answers

What’s the difference between LAN, WAN, and MAN?

I often hear about LAN (Local Area ...READ MORE

Feb 26, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
714 views
0 votes
0 answers

How is MITRE ATT&CK used?

MITRE ATT&CK is a framework that maps ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
393 views
0 votes
0 answers

How would you proceed if project success criteria were loosely defined?

I've worked on projects where it's not ...READ MORE

Feb 25, 2025 in PMP by Parshvi
• 740 points
741 views
0 votes
0 answers

What’s your strategy for handling a major data breach during a project?

I'm leading a project, and one of ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
680 views
0 votes
0 answers

What’s the difference between Observables and Promises?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
517 views
0 votes
0 answers

How can you implement Bayesian Ridge regression and visualize the coefficient shrinkage effect in Scikit-learn?

Can i know How can you implement ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
522 views
0 votes
0 answers
0 votes
1 answer

What is the difference between hashing and masking?

Hashing and masking are two distinct techniques ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,729 views
0 votes
0 answers

How do you manage team expectations if the project scope is reduced?

How do you keep your team motivated ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
649 views
0 votes
0 answers

Describe a time when you had to manage a project with an unclear goal. How did you proceed?

Have you ever had to manage a ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
434 views
0 votes
0 answers
0 votes
0 answers

What is the role of Adam optimizer in Keras, and how do I choose the best learning rate for it?

Can you explain to me What is ...READ MORE

Feb 24, 2025 in Generative AI by Vani
• 3,580 points
731 views
0 votes
0 answers

How does IP addressing work in computer networks?

IP addresses are used to identify devices ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
656 views
0 votes
1 answer

What is the difference between data flow and control flow?

In programming and systems design, control flow ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,872 views
0 votes
0 answers

How do DDoS attacks disrupt network services?

DDoS attacks flood a network with traffic, ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
609 views
0 votes
0 answers

How would you prioritize tasks when faced with limited resources and tight deadlines?

How do you prioritize tasks when you're ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
426 views
0 votes
0 answers

How can you fix memory consumption issues in a GPT-based model trained for long-text generation?

Can i know How can you fix ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,370 points
508 views
0 votes
2 answers

Is there a Power BI connector to track and visualize user activity within Power BI reports?

Power BI does not have a native ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,159 views
0 votes
0 answers

How would you fix syntax errors when training a transformer model for code generation tasks?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,370 points
507 views
0 votes
1 answer

How does an attacker bypass CSP (Content Security Policy)?

Content Security Policy (CSP) is a critical ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
908 views
0 votes
0 answers

How would you deal with multicollinearity using Scikit-learn when training a Linear Regression model?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,370 points
509 views
0 votes
0 answers

How do you ensure that all project requirements are gathered and documented effectively?

What’s your process for making sure all ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
424 views
0 votes
0 answers

Can you stop email spoofing?

Email spoofing allows attackers to forge sender ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
375 views
0 votes
1 answer

How to apply filter and map in a pipeline for specific data processing?

In RxJS, filter is used to remove ...READ MORE

Feb 24, 2025 in Java-Script by Navya
762 views
0 votes
2 answers

What is the Power BI Gateway architecture for hybrid data connections?

Power BI Gateway enables secure, encrypted data ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,152 views
0 votes
0 answers

How would you troubleshoot lack of coherence in generated dialogue when using a language model?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
500 views
0 votes
0 answers

What’s your approach to maintaining transparency in high-risk projects?

I’m managing a high-risk project where things ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
633 views
0 votes
0 answers

How do you navigate complex approval processes with multiple stakeholders?

I’m working on a project that needs ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
633 views