Trending questions in Edureka Community

0 votes
2 answers

What steps would you take to optimize a Power BI Desktop connection to a large data warehouse?

Optimize Power BI’s connection to a large ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 24,450 points
890 views
0 votes
1 answer

Why don't digital signatures reveal the sender’s private key?

Digital signatures are a cornerstone of modern ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
636 views
0 votes
1 answer

Why use manual testing for web server attacks if scanners can detect vulnerabilities?

While automated security scanners are valuable tools ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
608 views
0 votes
0 answers

What are the trade-offs of using FP16 precision for training Generative AI models?

With the help of code can you ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
546 views
0 votes
1 answer

How is the digital certificate sent alongside digital signatures?

When a digital signature is applied to ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
625 views
0 votes
1 answer

What are the negative aspects of creating fake security footprints?

Creating fake security footprints, such as misleading ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
564 views
0 votes
0 answers

What role does hyperparameter search play in optimizing Generative AI pipelines?

With the help of proper code example ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,370 points
509 views
0 votes
0 answers

How does zero-shot inference improve Generative AI for unseen tasks?

With the help of code can you ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,370 points
502 views
0 votes
0 answers

What are the challenges in embedding large contexts in Generative AI for summarization tasks?

Can you tell me What the challenges ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,370 points
494 views
0 votes
1 answer

How do you implement data parallelism in model training for resource-constrained environments?

In order to implement data parallelism in resource-constrained ...READ MORE

Nov 13, 2024 in Generative AI by Ashutosh
• 33,370 points
4,381 views
0 votes
0 answers

How do I set up CI/CD pipelines specifically for Generative AI model development?

With the help of code examples, can ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,370 points
484 views
0 votes
0 answers

How can federated learning be used to train Generative AI across distributed datasets?

With the help of code can you ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
505 views
0 votes
0 answers

How does regularization scaling impact Generative AI for hierarchical task optimization?

With the help of proper code examples, ...READ MORE

Feb 12, 2025 in Generative AI by Ashutosh
• 33,370 points
434 views
0 votes
0 answers
0 votes
0 answers

testing question for logout case, please dont approve it

testing question for logout case, please dont ...READ MORE

Feb 11, 2025 in Career Counselling by anonymous

edited Mar 5, 2025 507 views
0 votes
1 answer

Why is Nmap not showing open ports?

When Nmap fails to detect open ports ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,999 views
0 votes
0 answers

How do time decay models benefit Generative AI for real-time updates?

Can you tell me how time decay ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,370 points
460 views
0 votes
0 answers

How can I use LoRA or quantization techniques to reduce model size without significant accuracy loss?

With the help of code can you ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
546 views
0 votes
0 answers

How to improve word output for hugging face models?

With the help of code, can you ...READ MORE

Feb 14, 2025 in Generative AI by Ashutosh
• 33,370 points
370 views
0 votes
1 answer

Error - could not install packages due to an oserror - [errno 2] no such file or directory

I also met with the same problem ...READ MORE

Apr 28, 2022 in Python by narikkadan
• 86,360 points
44,576 views
0 votes
1 answer

Any reason I shouldn't be salting and hashing before putting through bCrypt?

When implementing password security with bcrypt, it's ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
574 views
+1 vote
2 answers

How do I register for a certification test for the pl 300?

These are the steps that can be ...READ MORE

Oct 25, 2024 in Power BI by pooja
• 24,450 points
4,229 views
0 votes
1 answer

How to exploit LDAP injection?

LDAP injection is a security vulnerability that ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
462 views
0 votes
1 answer

Why do digital signatures need different algorithms?

Digital signatures are essential in modern cryptography ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
544 views
0 votes
0 answers

Are comments obsolete in favor of Generative AI?

Can you tell me if comments are ...READ MORE

Feb 14, 2025 in Generative AI by Ashutosh
• 33,370 points
349 views
0 votes
0 answers

How do I identify and mitigate model hallucinations in domain-specific generative applications?

Can you tell me How do I ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
454 views
0 votes
1 answer

How secure is the hashing, salting, and stretching process in this diagram?

Evaluating the security of your password hashing, ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
534 views
0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
534 views
+1 vote
1 answer

How do you handle many-to-many relationships in Power Pivot when designing a data model to ensure correct data aggregation?

Handling the many-to-many relationships is really intelligent ...READ MORE

Dec 2, 2024 in Power BI by pooja
• 24,450 points
1,377 views
0 votes
2 answers

Can I use a single access token for multiple Power BI Embedded reports?

Yes, you can use a single access ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 36,180 points
757 views
0 votes
1 answer

Why is my Power BI matrix/table visual displaying duplicate rows or incorrect totals?

Cause of duplicate rows or wrong totals ...READ MORE

Dec 30, 2024 in Power BI by Anu
• 3,020 points

edited Mar 6, 2025 3,269 views
+1 vote
2 answers
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
587 views
0 votes
1 answer

Is salting a hash more secure than encrypting it?

When securing passwords, it's essential to understand ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
492 views
+1 vote
1 answer

What is the difference between Power Pivot's Data Model and Power BI’s data model, and how can they be integrated effectively?

Power Pivot Data Model compared with Power ...READ MORE

Dec 2, 2024 in Power BI by pooja
• 24,450 points
1,338 views
0 votes
1 answer

How can I check if a private key and certificate match in OpenSSL with ECDSA?

To check if a private key matches ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
3,341 views
0 votes
1 answer

Would re-salting passwords regularly in-/decrease security?

Regularly re-salting and re-hashing stored passwords—changing the ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
484 views
+1 vote
1 answer

How can you use Power Pivot in Excel to create a star schema model and integrate it with Power BI for reporting?

How Power Pivot gives optimal data models: ...READ MORE

Dec 2, 2024 in Power BI by pooja
• 24,450 points
1,320 views
0 votes
1 answer

Why is the header undefined in Node.js with Express?

1. Accessing the Header Incorrectly The headers in ...READ MORE

Dec 31, 2024 in Node-js by Navya
2,879 views
0 votes
1 answer

How to generate optimized source with and without sourcemap for production use?

To generate optimized source code with or ...READ MORE

Dec 31, 2024 in PHP by Navya
2,143 views
0 votes
0 answers

Why does Google Vertex AI throw timeout errors during large batch inference jobs?

With the help of code example tell ...READ MORE

Jan 22, 2025 in Generative AI by Nidhi
• 16,260 points
1,060 views
0 votes
1 answer

Why does Git keep asking for my password when using Azure DevOps, and how can I fix it?

Reason: When authentication isn't set up correctly or ...READ MORE

Dec 6, 2024 in DevOps Tools by Gagana
• 10,070 points
3,194 views
+1 vote
1 answer
0 votes
2 answers

What are the key differences between Power BI Report Server and Power BI Service?

Deployment: The power BI Report Server is to be ...READ MORE

Jan 23, 2025 in Power BI by anonymous
• 24,450 points
2,444 views
+1 vote
1 answer
0 votes
1 answer

How to add popper.js in React?

Install Popper.js via npm (npm install @popperjs/core), ...READ MORE

Feb 23, 2025 in Node-js by Kavya
1,141 views
+1 vote
1 answer

How do you optimize Power Pivot models to handle millions of rows of transactional data without degrading performance?

Capacity Modeling: Power Pivot models that process ...READ MORE

Dec 12, 2024 in Power BI by pooja
• 24,450 points
947 views