Trending questions in Edureka Community

0 votes
1 answer

What is the role of the var keyword, and in which situations should it be used or avoided?

In JavaScript, the var keyword is used ...READ MORE

Jan 10 in Java-Script by Navya
451 views
+1 vote
2 answers

How do you format visuals dynamically based on conditional logic using DAX?

To vary the arrangement of the visuals ...READ MORE

Nov 20, 2024 in Power BI by pooja
• 24,450 points
680 views
0 votes
1 answer

Does a private key always generate the same public key?

Yes, a private key always generates the ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
529 views
0 votes
1 answer
+5 votes
4 answers

How to execute a python file with few arguments in java?

You can use Java Runtime.exec() to run python script, ...READ MORE

Mar 27, 2018 in Java by DragonLord999
• 8,450 points

edited Nov 7, 2018 by Omkar 85,795 views
+1 vote
2 answers

How do I create interactive dashboards that adjust based on user roles or permissions?

When designing interactive dashboards in Power BI ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
722 views
0 votes
1 answer

What are the categories of security control?

Security controls are essential measures implemented to ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
560 views
+1 vote
2 answers

How do you handle JSON data parsing and transformations in Power BI dataflows?

Using Power BI dataflows for parsing and ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
752 views
0 votes
1 answer

Why does my GAN produce a blurry image instead of sharp realistic ones?

To address this, use techniques like using ...READ MORE

Jan 8 in Generative AI by pulkit
514 views
0 votes
1 answer

How can I avoid sampling bias in my generative model during inference?

In order to avoid sampling bias in my ...READ MORE

Jan 9 in Generative AI by dhritiman singh
469 views
0 votes
1 answer

What is collision resistance in a hash function?

Collision resistance is a fundamental property of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
404 views
0 votes
1 answer

What strategies do you use to manage projects with limited resources?

Managing projects with limited resources requires strategic ...READ MORE

Jan 10 in PMP by Sonia
445 views
+1 vote
2 answers

How do you handle duplicate data entries and deduplication logic in Power BI transformations?

Approaching duplicate data elements and formulating deduplication ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
732 views
0 votes
1 answer

How can I prevent overfitting in a generative model trained on limited data?

To prevent overfitting in a generative model ...READ MORE

Jan 8 in Generative AI by chinese boy
510 views
0 votes
1 answer

What is the process for importing a JSON file in ECMAScript 6?

In ECMAScript 6 (ES6), importing a JSON ...READ MORE

Jan 10 in Java-Script by Navya
428 views
0 votes
1 answer

How do I handle batch size adjustments when training large models in Flux?

To handle batch size adjustments when training ...READ MORE

Jan 9 in Generative AI by raju thapa
458 views
0 votes
1 answer

Why does Nmap show closed ports?

When Nmap reports a port as closed, ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
507 views
0 votes
1 answer

How do I resolve NaN loss values when training a generative model in Julia with Flux?

To resolve NaN loss values when training ...READ MORE

Jan 8 in Generative AI by niya sa
501 views
0 votes
1 answer

Is HTTP Authorization header encrypted?

When transmitting an HTTP Authorization header over ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
387 views
0 votes
1 answer

How do you track project dependencies and avoid bottlenecks?

Tracking project dependencies and avoiding bottlenecks is ...READ MORE

Jan 10 in PMP by Anu
428 views
0 votes
1 answer

What distinguishes JavaScript from ECMAScript?

Aspect JavaScript ECMAScript Definition A programming language used primarily for web ...READ MORE

Jan 10 in Java-Script by Navya
373 views
+1 vote
3 answers

How do I create a flexible date range slicer that allows users to switch between monthly, quarterly, and yearly views?

Proper date hierarchy and dynamic date filters ...READ MORE

Nov 12, 2024 in Power BI by pooja
• 24,450 points
1,252 views
0 votes
1 answer

How to determine the hashing algorithm of a public key in the certificate?

To determine the hashing algorithm used to ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
492 views
0 votes
1 answer

How do I improve zero-shot generation using Hugging Face models like GPT-2?

To improve zero-shot generation with Hugging Face ...READ MORE

Jan 9 in Generative AI by madhav kumar
442 views
0 votes
1 answer

How can I fix the slow inference time when using Hugging Face’s GPT for large inputs?

To fix slow inference time with Hugging ...READ MORE

Jan 8 in Generative AI by balaji shivastava
491 views
0 votes
1 answer

How do I implement custom augmentation techniques for image generation?

To implement custom augmentation techniques for image ...READ MORE

Jan 9 in Generative AI by anupam mishra
439 views
0 votes
1 answer

Why should you not block or close ports in a firewall?

Blocking or closing ports in a firewall ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
486 views
0 votes
1 answer

How do I fix discriminator overfitting in FastAI’s GAN training?

To fix discriminator overfitting in FastAI's GAN ...READ MORE

Jan 9 in Generative AI by amol shrivastav
436 views
0 votes
1 answer

How can a multiline string literal be assigned to a variable?

You can use template literals, introduced in ...READ MORE

Jan 10 in Java-Script by Navya
403 views
0 votes
1 answer

Is it possible to build unbreakable Protocol Obfuscation?

Achieving unbreakable protocol obfuscation—where a system is entirely ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
372 views
0 votes
1 answer

What’s your approach for managing stakeholders with conflicting priorities?

Managing stakeholders with conflicting priorities requires clear ...READ MORE

Jan 10 in PMP by Ali
412 views
0 votes
1 answer

How would you manage a project when you have limited visibility into stakeholder priorities?

Project management with less visibility into stakeholder ...READ MORE

Jan 10 in PMP by Anu
411 views
+1 vote
2 answers

What’s the best approach to handle non-tabular data sources (e.g., unstructured data) in Power BI?

Power BI does have certain restrictions when ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
702 views
0 votes
1 answer

How do you estimate project costs accurately from the start?

To develop precise cost estimates while accounting ...READ MORE

Jan 10 in PMP by Zaid
409 views
0 votes
1 answer

How is the public key included in the CSR?

When creating a Certificate Signing Request (CSR), ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
366 views
0 votes
1 answer

How can I resolve shape mismatch errors when feeding data into a Keras VAE?

To resolve shape mismatch errors when feeding ...READ MORE

Jan 8 in Generative AI by neha jha
474 views
0 votes
1 answer

Why does my Transformer-based text generation model produce incoherent sequences?

Incoherent sequences in Transformer-based text generation models ...READ MORE

Jan 8 in Generative AI by heretechboy
473 views
0 votes
1 answer

How do I avoid mode dropping when training a conditional GAN for high-resolution images?

In order to avoid mode dropping when training ...READ MORE

Jan 9 in Generative AI by Niraj yadav
422 views
0 votes
1 answer

How do you deal with unexpected changes in project timelines?

Dealing with the change in project timelines ...READ MORE

Jan 7 in PMP by Sufi
569 views
0 votes
1 answer

How can I fix the vanishing gradient problem in TensorFlow for GANs?

To fix the vanishing gradient problem in ...READ MORE

Jan 9 in Generative AI by shalini bua
413 views
0 votes
1 answer

Is encryption in HTTPS done by the browser or by the system?

When a browser establishes an HTTPS connection, ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
352 views
0 votes
1 answer

Why is my Power BI matrix/table visual displaying duplicate rows or incorrect totals?

Cause of duplicate rows or wrong totals ...READ MORE

Dec 30, 2024 in Power BI by Anu
• 3,020 points

edited Mar 6 1,846 views
0 votes
1 answer

Is SSH public key authentication secure?

SSH public key authentication is generally more ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
350 views
0 votes
1 answer

How do I resolve NaN gradients when training GANs in PyTorch?

In order to resolve NaN gradients when ...READ MORE

Jan 7 in Generative AI by anshuman yadav
483 views
0 votes
1 answer

Which SSH key is more secure?

When selecting an SSH key type for ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
349 views
0 votes
1 answer

How Can P2P Systems Recover Compromised Identities Using a Web-of-Trust?

In peer-to-peer (P2P) systems, the Web of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
347 views
0 votes
1 answer

Why does my model generate inconsistent output in a conditional GAN?

To address this, ensure the conditioning input ...READ MORE

Jan 9 in Generative AI by evanjilin joshep
408 views
0 votes
1 answer

What’s the best approach to managing stakeholder expectations?

Effective management of stakeholder expectations is critical ...READ MORE

Jan 7 in PMP by Sonia
556 views
0 votes
1 answer

How do I merge the properties of two JavaScript objects?

https://www.sitepoint.com/merging-objects-javascript/ You can use either the spread operator ...READ MORE

Jan 10 in Java-Script by Navya
369 views