Trending questions in Edureka Community

0 votes
1 answer
0 votes
1 answer

How do you deal with unexpected changes in project timelines?

Dealing with the change in project timelines ...READ MORE

Jan 7 in PMP by Sufi
302 views
0 votes
1 answer

What’s your method for identifying project risks early on?

As an experienced project manager, identifying project ...READ MORE

Jan 10 in PMP by Anu
231 views
0 votes
1 answer

Why should you not block or close ports in a firewall?

Blocking or closing ports in a firewall ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
190 views
0 votes
1 answer

What are the categories of security control?

Security controls are essential measures implemented to ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
229 views
0 votes
1 answer

How to Speed Up Nmap SSL Service Detection on Non-Standard Ports?

Scanning for SSL services on non-standard ports ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
228 views
0 votes
1 answer

How can I resolve out-of-vocabulary token issues in Hugging Face tokenizers?

To resolve out-of-vocabulary (OOV) token issues in ...READ MORE

Jan 8 in Generative AI by nidhi jha
185 views
0 votes
1 answer

How secure is binding to localhost in order to prevent remote connections?

Binding a server to localhost (127.0.0.1) is ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
220 views
+1 vote
2 answers

How do I create interactive dashboards that adjust based on user roles or permissions?

When designing interactive dashboards in Power BI ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
373 views
0 votes
1 answer

Why do I get RuntimeError: CUDA out of memory when training a large model on GPU?

The RuntimeError: CUDA out of memory occurs ...READ MORE

Jan 7 in Generative AI by hoor sania
199 views
0 votes
1 answer

How to Secure Windows Services with Open Ports Without Compromising Functionality?

Securing Windows services that require open ports ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
216 views
0 votes
1 answer

How can I fix the tuning of batch normalization layers when training GANs?

To fix tuning issues with batch normalization ...READ MORE

Jan 7 in Generative AI by anupam thapa
194 views
0 votes
1 answer

Why does BART’s generated summary look incomplete after fine-tuning on custom data?

BART's generated summaries may look incomplete after ...READ MORE

Jan 8 in Generative AI by amit singh
169 views
0 votes
1 answer

Are Security Controls Overlapping?

In information security, overlapping controls, where a ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
206 views
+1 vote
2 answers

How do you format visuals dynamically based on conditional logic using DAX?

To vary the arrangement of the visuals ...READ MORE

Nov 20, 2024 in Power BI by pooja
• 24,450 points
307 views
+1 vote
1 answer

How to lock a pen drive with a password on a mobile device?

In order to password-protect a USB (pen) ...READ MORE

Nov 7, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,765 views
+1 vote
2 answers

How do you create interactive slicers with search capabilities for large datasets?

Designing Power BI common data slicers with ...READ MORE

Nov 20, 2024 in Power BI by pooja
• 24,450 points
298 views
+1 vote
2 answers

How do you handle duplicate data entries and deduplication logic in Power BI transformations?

Approaching duplicate data elements and formulating deduplication ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
368 views
0 votes
1 answer
0 votes
1 answer

How do you deal with project teams that are resistant to change?

Dealing with resistance to change is not ...READ MORE

Jan 7 in PMP by Ali
247 views
0 votes
1 answer

What’s the best approach to managing stakeholder expectations?

Effective management of stakeholder expectations is critical ...READ MORE

Jan 7 in PMP by Sonia
242 views
0 votes
1 answer

Are control categories actually exclusive in security?

In information security, controls are commonly categorized ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
175 views
0 votes
1 answer

What’s the best way to communicate project delays to stakeholders?

From my perspective, communicating with stakeholders about ...READ MORE

Jan 3 in PMP by Anu
320 views
0 votes
1 answer

How do I implement a latent space interpolation to generate smooth transitions between generated outputs?

In order To implement latent space interpolation ...READ MORE

Jan 3 in Generative AI by hoor sania

edited Mar 6 306 views
+1 vote
2 answers

How do you handle JSON data parsing and transformations in Power BI dataflows?

Using Power BI dataflows for parsing and ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
364 views
+1 vote
2 answers

What’s the best approach to handle non-tabular data sources (e.g., unstructured data) in Power BI?

Power BI does have certain restrictions when ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
338 views
+1 vote
2 answers

How can I create Power BI visuals that change based on date comparisons (e.g., YOY growth)?

If you want to make visuals in ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
336 views
0 votes
1 answer

What’s the difference between session hijacking and spoofing?

Session hijacking and spoofing are both cyberattack ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
785 views
0 votes
1 answer

How do you use TensorFlow’s tf.keras.preprocessing for tokenizing text in generative AI?

You can use TensorFlow's tf.keras.preprocessing.text.Tokenizer to tokenize ...READ MORE

Jan 3 in Generative AI by Ashutosh
• 32,730 points
322 views
+1 vote
3 answers

What are some advanced DAX time intelligence techniques for fiscal year reporting?

In order to create report accuracy based ...READ MORE

Nov 18, 2024 in Power BI by pooja
• 24,450 points
316 views
0 votes
1 answer

How can you integrate PyTorch’s torch.utils.checkpoint for memory-efficient training of generative models?

You can integrate PyTorch's torch.utils.checkpoint for memory-efficient ...READ MORE

Jan 3 in Generative AI by your sung
312 views
+1 vote
2 answers

What strategies can help reduce query folding limitations in Power Query for complex data sources?

Though Power Query's query folding is functionally ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
314 views
+1 vote
2 answers

How do you integrate machine learning predictions into Power BI reports using Azure ML?

When it comes to using Azure ML ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
308 views
0 votes
1 answer

What are the most common project management mistakes to avoid?

Over the years, I’ve encountered several common ...READ MORE

Jan 3 in PMP by Ali
274 views
0 votes
1 answer

What are the Design Flaws of the WPS PIN System and How Can it be Secured for Future Use?

Wi-Fi Protected Setup (WPS) was introduced to ...READ MORE

Jan 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
306 views
0 votes
1 answer

How do you handle sequence padding and truncation in text-based generative AI?

In text-based generative AI, sequence padding and ...READ MORE

Jan 2 in Generative AI by techboy
317 views
–1 vote
1 answer

Open file in SDCard on Android

To open a file that is on ...READ MORE

Jun 20, 2022 in Others by nisha
• 2,210 points
40,403 views
0 votes
0 answers

How do you manage the budget in complex projects?

How do you keep the project on ...READ MORE

Jan 6 in PMP by Hoor
• 4,690 points
168 views
0 votes
1 answer

What is the hardest part of the Security+ exam?

Preparing for the CompTIA Security+ exam involves ...READ MORE

Jan 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
279 views
0 votes
1 answer

How do you handle scope creep in a project?

Scope creep is not easy to handle, ...READ MORE

Jan 2 in PMP by Gagana
274 views
0 votes
1 answer

How do you ensure quality control in every phase of a project?

Ensuring quality control in every phase of ...READ MORE

Jan 3 in PMP by Sonia
231 views
0 votes
1 answer

How do you track project progress and ensure on-time delivery?

From my experience, what really makes this ...READ MORE

Jan 3 in PMP by Ali
229 views
0 votes
1 answer

How do you prioritize tasks when managing multiple projects?

The ability to multitask in managing projects ...READ MORE

Jan 3 in PMP by Sufi
226 views
0 votes
1 answer

How can I fix the problem of non-convergence in GAN models?

To address the issue of non-convergence in ...READ MORE

Jan 3 in Generative AI by anil bopari
251 views
+1 vote
2 answers

How can I perform sentiment analysis on text data using Power BI and text analytics APIs?

If you are looking to conduct sentiment ...READ MORE

Nov 18, 2024 in Power BI by pooja
• 24,450 points
285 views
0 votes
1 answer

What’s the most important skill for managing creative projects in advertising?

One of the most important skills for ...READ MORE

Jan 2 in PMP by Anu
255 views
0 votes
1 answer

How is project management in construction different from software development?

When comparing project management in construction vs. ...READ MORE

Jan 2 in PMP by Sonia
284 views
0 votes
1 answer

How do you manage research and development projects in pharma?

Managing Research & Development projects in pharma ...READ MORE

Jan 2 in PMP by Sufi
250 views
0 votes
1 answer

What’s your biggest project management failure and what did you learn?

One of my greatest project management failures ...READ MORE

Jan 2 in PMP by Sonia
249 views