Trending questions in Edureka Community

0 votes
1 answer

What’s the difference between session hijacking and spoofing?

Session hijacking and spoofing are both cyberattack ...READ MORE

Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,112 views
0 votes
1 answer

What strategies do you use to manage projects with limited resources?

Managing projects with limited resources requires strategic ...READ MORE

Jan 10 in PMP by Sonia
369 views
+1 vote
2 answers

How do you format visuals dynamically based on conditional logic using DAX?

To vary the arrangement of the visuals ...READ MORE

Nov 20, 2024 in Power BI by pooja
• 24,450 points
585 views
+1 vote
2 answers

How do I create interactive dashboards that adjust based on user roles or permissions?

When designing interactive dashboards in Power BI ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
630 views
0 votes
1 answer

How do I implement custom augmentation techniques for image generation?

To implement custom augmentation techniques for image ...READ MORE

Jan 9 in Generative AI by anupam mishra
384 views
0 votes
1 answer

How do I handle batch size adjustments when training large models in Flux?

To handle batch size adjustments when training ...READ MORE

Jan 9 in Generative AI by raju thapa
384 views
0 votes
1 answer

What distinguishes JavaScript from ECMAScript?

Aspect JavaScript ECMAScript Definition A programming language used primarily for web ...READ MORE

Jan 10 in Java-Script by Navya
307 views
0 votes
1 answer

How do I fix discriminator overfitting in FastAI’s GAN training?

To fix discriminator overfitting in FastAI's GAN ...READ MORE

Jan 9 in Generative AI by amol shrivastav
378 views
0 votes
1 answer

How do I improve zero-shot generation using Hugging Face models like GPT-2?

To improve zero-shot generation with Hugging Face ...READ MORE

Jan 9 in Generative AI by madhav kumar
376 views
0 votes
1 answer

Why does my GAN produce a blurry image instead of sharp realistic ones?

To address this, use techniques like using ...READ MORE

Jan 8 in Generative AI by pulkit
423 views
0 votes
1 answer

Is it possible to build unbreakable Protocol Obfuscation?

Achieving unbreakable protocol obfuscation—where a system is entirely ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
313 views
0 votes
1 answer

How do you estimate project costs accurately from the start?

To develop precise cost estimates while accounting ...READ MORE

Jan 10 in PMP by Zaid
353 views
0 votes
1 answer

How to determine the hashing algorithm of a public key in the certificate?

To determine the hashing algorithm used to ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
421 views
0 votes
1 answer

What’s your approach for managing stakeholders with conflicting priorities?

Managing stakeholders with conflicting priorities requires clear ...READ MORE

Jan 10 in PMP by Ali
346 views
0 votes
1 answer

How can a multiline string literal be assigned to a variable?

You can use template literals, introduced in ...READ MORE

Jan 10 in Java-Script by Navya
335 views
0 votes
1 answer

How would you manage a project when you have limited visibility into stakeholder priorities?

Project management with less visibility into stakeholder ...READ MORE

Jan 10 in PMP by Anu
344 views
0 votes
1 answer

Why should you not block or close ports in a firewall?

Blocking or closing ports in a firewall ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
414 views
0 votes
1 answer

Why does Nmap show closed ports?

When Nmap reports a port as closed, ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
414 views
+1 vote
2 answers

How do you handle JSON data parsing and transformations in Power BI dataflows?

Using Power BI dataflows for parsing and ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
647 views
0 votes
1 answer

How is the public key included in the CSR?

When creating a Certificate Signing Request (CSR), ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
302 views
0 votes
1 answer

Is encryption in HTTPS done by the browser or by the system?

When a browser establishes an HTTPS connection, ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
302 views
0 votes
1 answer

Is HTTP Authorization header encrypted?

When transmitting an HTTP Authorization header over ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
301 views
0 votes
1 answer

How do I avoid mode dropping when training a conditional GAN for high-resolution images?

In order to avoid mode dropping when training ...READ MORE

Jan 9 in Generative AI by Niraj yadav
358 views
0 votes
1 answer

How do I resolve NaN loss values when training a generative model in Julia with Flux?

To resolve NaN loss values when training ...READ MORE

Jan 8 in Generative AI by niya sa
402 views
0 votes
1 answer

Is SSH public key authentication secure?

SSH public key authentication is generally more ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
292 views
+1 vote
2 answers

How do you handle duplicate data entries and deduplication logic in Power BI transformations?

Approaching duplicate data elements and formulating deduplication ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
621 views
0 votes
1 answer

How do you track project dependencies and avoid bottlenecks?

Tracking project dependencies and avoiding bottlenecks is ...READ MORE

Jan 10 in PMP by Anu
332 views
0 votes
1 answer

What’s the best approach to managing stakeholder expectations?

Effective management of stakeholder expectations is critical ...READ MORE

Jan 7 in PMP by Sonia
503 views
0 votes
1 answer

Why does my Transformer-based text generation model produce incoherent sequences?

Incoherent sequences in Transformer-based text generation models ...READ MORE

Jan 8 in Generative AI by heretechboy
398 views
0 votes
1 answer

How can I resolve shape mismatch errors when feeding data into a Keras VAE?

To resolve shape mismatch errors when feeding ...READ MORE

Jan 8 in Generative AI by neha jha
397 views
0 votes
1 answer

How can I fix the slow inference time when using Hugging Face’s GPT for large inputs?

To fix slow inference time with Hugging ...READ MORE

Jan 8 in Generative AI by balaji shivastava
399 views
0 votes
1 answer

How do I merge the properties of two JavaScript objects?

https://www.sitepoint.com/merging-objects-javascript/ You can use either the spread operator ...READ MORE

Jan 10 in Java-Script by Navya
316 views
0 votes
1 answer

How Can P2P Systems Recover Compromised Identities Using a Web-of-Trust?

In peer-to-peer (P2P) systems, the Web of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
286 views
0 votes
1 answer

How can I fix the vanishing gradient problem in TensorFlow for GANs?

To fix the vanishing gradient problem in ...READ MORE

Jan 9 in Generative AI by shalini bua
346 views
0 votes
1 answer

Why does my model generate inconsistent output in a conditional GAN?

To address this, ensure the conditioning input ...READ MORE

Jan 9 in Generative AI by evanjilin joshep
343 views
0 votes
1 answer

Which SSH key is more secure?

When selecting an SSH key type for ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
281 views
0 votes
1 answer

What’s your approach when asked to add new deliverables close to the deadline?

When new deliverables are added to the ...READ MORE

Jan 10 in PMP by Priya
319 views
0 votes
1 answer

Which SSH security is stronger?

Ensuring robust SSH security involves careful selection ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
277 views
0 votes
1 answer

How do you deal with project teams that are resistant to change?

Dealing with resistance to change is not ...READ MORE

Jan 7 in PMP by Ali
486 views
0 votes
1 answer

What are the key success factors for delivering projects on time and within budget?

In my opinion, tight deadlines and low ...READ MORE

Jan 10 in PMP by Gagana
317 views
0 votes
1 answer

What are the steps to debug incorrect weight initialization in a generative model using a deep learning framework?

To debug incorrect weight initialization in a ...READ MORE

Jan 7 in Generative AI by shalini guha
408 views
0 votes
1 answer

What happens if an SSL certificate is not renewed?

When an SSL certificate expires and is ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
274 views
0 votes
1 answer

How do you deal with unexpected changes in project timelines?

Dealing with the change in project timelines ...READ MORE

Jan 7 in PMP by Sufi
487 views
0 votes
1 answer

Is code obfuscation common in FOSS?

In Free and Open-Source Software (FOSS), code ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
270 views
0 votes
1 answer

How can I avoid exploding gradients in large-scale generative models?

In order to avoid exploding gradients in ...READ MORE

Jan 9 in Generative AI by techboy support
330 views
0 votes
1 answer

How do I resolve NaN gradients when training GANs in PyTorch?

In order to resolve NaN gradients when ...READ MORE

Jan 7 in Generative AI by anshuman yadav
397 views
0 votes
1 answer

Under what conditions should arrow functions be utilized in ECMAScript 6?

Arrow functions in ECMAScript 6 should be ...READ MORE

Jan 10 in Java-Script by Navya
288 views
0 votes
1 answer

How do I fix the gradient penalty implementation in GANs for stability?

To stabilize GAN training, You can implement ...READ MORE

Jan 9 in Generative AI by priyanka
322 views
0 votes
1 answer

How do I check if a port is open in Nmap?

To check if a specific port is ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
368 views