Trending questions in Edureka Community

0 votes
1 answer

Which SSH key is more secure?

When selecting an SSH key type for ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
614 views
0 votes
1 answer

How can I avoid exploding gradients in large-scale generative models?

In order to avoid exploding gradients in ...READ MORE

Jan 9, 2025 in Generative AI by techboy support
675 views
0 votes
1 answer

How can I solve slow convergence when training large generative models?

To solve slow convergence when training large ...READ MORE

Jan 8, 2025 in Generative AI by hooter techgil
720 views
0 votes
1 answer

Why does my Transformer-based text generation model produce incoherent sequences?

Incoherent sequences in Transformer-based text generation models ...READ MORE

Jan 8, 2025 in Generative AI by heretechboy
711 views
0 votes
0 answers

How can differentiable augmentation be applied to VAEs to improve generative model robustness?

Can you tell me how differentiable augmentation ...READ MORE

Jan 15, 2025 in Generative AI by Ashutosh
• 33,370 points
419 views
0 votes
1 answer

Does SSL/TLS provide non-repudiation service?

SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,210 views
0 votes
1 answer

How can I fix issues related to model overfitting when training on small generative datasets?

To fix overfitting on small generative datasets, ...READ MORE

Jan 8, 2025 in Generative AI by anila k
708 views
0 votes
1 answer

What is the difference between authenticity and non-repudiation?

Authenticity and non-repudiation are fundamental concepts in ...READ MORE

Dec 27, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,207 views
+1 vote
2 answers

How can I create Power BI visuals that change based on date comparisons (e.g., YOY growth)?

If you want to make visuals in ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
925 views
0 votes
1 answer

How do you deal with unexpected changes in project timelines?

Dealing with the change in project timelines ...READ MORE

Jan 7, 2025 in PMP by Sufi
809 views
0 votes
1 answer

Does Nmap Report Open Ports Indicate Active Services or Just Firewall Configuration?

When Nmap reports a port as open, ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
742 views
0 votes
1 answer

What’s your approach when asked to add new deliverables close to the deadline?

When new deliverables are added to the ...READ MORE

Jan 10, 2025 in PMP by Priya
629 views
0 votes
1 answer

How do you track project dependencies and avoid bottlenecks?

Tracking project dependencies and avoiding bottlenecks is ...READ MORE

Jan 10, 2025 in PMP by Anu
629 views
0 votes
1 answer

Why does my Power BI report display different results when opened by different users, even though they are using the same dataset?

Due to row-level security (RLS) that sets ...READ MORE

Dec 18, 2024 in Power BI by anonymous
• 3,020 points

edited Mar 6, 2025 2,397 views
0 votes
1 answer

How can I update pipelines and pull requests to reflect a renamed branch in Azure DevOps?

Refresh Pipelines: Navigate to Azure DevOps Pipelines. In the ...READ MORE

Dec 19, 2024 in DevOps Tools by Gagana
• 10,070 points
1,828 views
0 votes
1 answer

Which SSH security is stronger?

Ensuring robust SSH security involves careful selection ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
583 views
+1 vote
3 answers

What are some advanced DAX time intelligence techniques for fiscal year reporting?

In order to create report accuracy based ...READ MORE

Nov 18, 2024 in Power BI by pooja
• 24,450 points
904 views
0 votes
1 answer

How do I fix discriminator overfitting in FastAI’s GAN training?

To fix discriminator overfitting in FastAI's GAN ...READ MORE

Jan 9, 2025 in Generative AI by amol shrivastav
639 views
0 votes
1 answer

Can I take CompTIA Security+ online?

Yes, you can take the CompTIA Security+ ...READ MORE

Jan 3, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
907 views
0 votes
1 answer

What’s your method for identifying project risks early on?

As an experienced project manager, identifying project ...READ MORE

Jan 10, 2025 in PMP by Anu
727 views
0 votes
1 answer

How I fixed the unexpected token error in Jest?

To resolve this issue , you need ...READ MORE

Dec 31, 2024 in Node-js by Navya
1,031 views
0 votes
1 answer

How can I avoid sampling bias in my generative model during inference?

In order to avoid sampling bias in my ...READ MORE

Jan 9, 2025 in Generative AI by dhritiman singh
628 views
0 votes
1 answer

What distinguishes JavaScript from ECMAScript?

Aspect JavaScript ECMAScript Definition A programming language used primarily for web ...READ MORE

Jan 10, 2025 in Java-Script by Navya
551 views
0 votes
1 answer

How do I implement a latent space interpolation to generate smooth transitions between generated outputs?

In order To implement latent space interpolation ...READ MORE

Jan 3, 2025 in Generative AI by hoor sania

edited Mar 6, 2025 843 views
0 votes
1 answer

Is SSH public key authentication secure?

SSH public key authentication is generally more ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
553 views
0 votes
1 answer

What is the hardest part of the Security+ exam?

Preparing for the CompTIA Security+ exam involves ...READ MORE

Jan 3, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
882 views
0 votes
1 answer

How do I check if a port is open in Nmap?

To check if a specific port is ...READ MORE

Jan 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
659 views
0 votes
1 answer

Why does "undefined" get added to the URL path in Node.js?

It usually indicates an issue in the ...READ MORE

Nov 19, 2024 in Web Development by kavya
2,813 views
0 votes
2 answers

How can I create custom tooltips with dynamic images or icons in Power BI?

In order to create a custom tooltip ...READ MORE

Jan 23, 2025 in Power BI by anonymous
• 24,450 points
1,436 views
0 votes
1 answer
0 votes
1 answer

How is the public key included in the CSR?

When creating a Certificate Signing Request (CSR), ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
546 views
0 votes
1 answer

How do I implement custom augmentation techniques for image generation?

To implement custom augmentation techniques for image ...READ MORE

Jan 9, 2025 in Generative AI by anupam mishra
602 views
0 votes
1 answer
0 votes
1 answer

How can I fix the vanishing gradient problem in TensorFlow for GANs?

To fix the vanishing gradient problem in ...READ MORE

Jan 9, 2025 in Generative AI by shalini bua
595 views
0 votes
1 answer

Is it possible to build unbreakable Protocol Obfuscation?

Achieving unbreakable protocol obfuscation—where a system is entirely ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
531 views
0 votes
1 answer

How to debug "Error: spawn ENOENT" in Node.js?

Steps to Debug and Fix the spawn ...READ MORE

Dec 13, 2024 in Web Development by Navya
1,735 views
0 votes
1 answer

How can I resolve out-of-vocabulary token issues in Hugging Face tokenizers?

To resolve out-of-vocabulary (OOV) token issues in ...READ MORE

Jan 8, 2025 in Generative AI by nidhi jha
639 views
0 votes
1 answer

How do I deal with gradient instability when training deep generative networks?

To deal with gradient instability when training ...READ MORE

Jan 9, 2025 in Generative AI by dhiraj achraya
589 views
0 votes
1 answer

What is IP address conflict with another system on the network?

An IP address conflict occurs when two ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
677 views
0 votes
1 answer

How do you deal with project teams that are resistant to change?

Dealing with resistance to change is not ...READ MORE

Jan 7, 2025 in PMP by Ali
732 views
0 votes
1 answer

What are the key success factors for delivering projects on time and within budget?

In my opinion, tight deadlines and low ...READ MORE

Jan 10, 2025 in PMP by Gagana
561 views
+1 vote
2 answers

How do you create interactive slicers with search capabilities for large datasets?

Designing Power BI common data slicers with ...READ MORE

Nov 20, 2024 in Power BI by pooja
• 24,450 points
777 views
0 votes
1 answer

What happens if an SSL certificate is not renewed?

When an SSL certificate expires and is ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
517 views
0 votes
1 answer

Is encryption in HTTPS done by the browser or by the system?

When a browser establishes an HTTPS connection, ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
516 views
0 votes
1 answer

How to Change the Default Black Background Color of an HTML Canvas?

To change the default black background color ...READ MORE

Dec 12, 2024 in Web Development by Navya
1,767 views
0 votes
1 answer

How do I merge the properties of two JavaScript objects?

https://www.sitepoint.com/merging-objects-javascript/ You can use either the spread operator ...READ MORE

Jan 10, 2025 in Java-Script by Navya
541 views
0 votes
1 answer

How do you use TensorFlow’s tf.keras.preprocessing for tokenizing text in generative AI?

You can use TensorFlow's tf.keras.preprocessing.text.Tokenizer to tokenize ...READ MORE

Jan 3, 2025 in Generative AI by Ashutosh
• 33,370 points
839 views
0 votes
1 answer

What are the steps of risk assessment in information security?

Conducting a comprehensive risk assessment in information ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
661 views
0 votes
1 answer

How Can P2P Systems Recover Compromised Identities Using a Web-of-Trust?

In peer-to-peer (P2P) systems, the Web of ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
507 views
+1 vote
1 answer

Why is incremental refresh not working as expected in Power BI, and how can I troubleshoot it?

In most cases, when the incremental refresh ...READ MORE

Nov 11, 2024 in Power BI by pooja
• 24,450 points
1,763 views