Trending questions in Edureka Community

0 votes
1 answer

How can I include images and branding in Paginated Reports?

The following techniques can be used to ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
104 views
0 votes
1 answer

How can I compare "6 Months vs 6 Months" dynamically in a Power BI bar chart?

Create a Date Table for time-based calculations. Create ...READ MORE

Jun 13 in Power BI by anonymous
• 36,180 points
102 views
0 votes
1 answer

Why do my relationships in Power Pivot not filter as expected in visuals?

1. Inactive Relationships What It Is: Power Pivot allows ...READ MORE

Jun 11 in Power BI by anonymous
• 36,180 points
194 views
0 votes
0 answers

How does email encryption work with PGP?

How does PGP use asymmetric cryptography to ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
94 views
0 votes
0 answers

Can quantum cryptography stop man-in-the-middle attacks?

Can quantum cryptography prevent man-in-the-middle attacks by ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
88 views
0 votes
0 answers

What is a birthday attack in cryptography?

What is a birthday attack in cryptography, ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
87 views
0 votes
0 answers

How do honeytokens help detect enumeration attempts?

How do honeytokens, which are fake data ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
86 views
0 votes
1 answer

Is there any advantage in writing calculated columns in Power Pivot instead of in Power Query?

When performance is a concern with larger ...READ MORE

Jun 11 in Power BI by anonymous
• 36,180 points
139 views
0 votes
1 answer

How do I pivot and unpivot columns dynamically in Power BI?

To dynamically pivot or unpivot columns in ...READ MORE

Jun 9 in Power BI by anonymous
• 36,180 points
227 views
0 votes
0 answers

What is the role of federated learning in threat intelligence?

How does federated learning allow multiple organizations ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
84 views
0 votes
0 answers

How does BitLocker provide disk-level encryption?

How does BitLocker encrypt an entire disk ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
83 views
0 votes
0 answers

How does AI automate pentesting for vulnerability assessment?

How does AI use automated simulations to ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
83 views
0 votes
0 answers

Can an automated vulnerability scanner be used to detect zero days?

Can an automated vulnerability scanner detect zero-day ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
81 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities? [closed]

Machine learning identifies unknown vulnerabilities by analyzing ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 81 views
0 votes
0 answers

How are ciphers used to keep information secret?

How do ciphers help keep information secret ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
79 views
0 votes
0 answers

How does RSA encryption protect sensitive data?

How does RSA encryption work by using ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
78 views
0 votes
0 answers

How does behavioral analysis detect runtime vulnerabilities? [closed]

Behavioral analysis monitors application behavior during runtime, ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 78 views
0 votes
0 answers

How does data poisoning impact AI-driven vulnerability scans?

How does introducing malicious data into the ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
77 views
0 votes
0 answers

How does machine learning detect zero-day vulnerabilities?

How can machine learning analyze software behavior ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
77 views
0 votes
0 answers

How does AI-driven attack simulation test network security? [closed]

AI-driven simulations model attack scenarios to test ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 74 views
0 votes
0 answers

How do deep learning models enhance IDS evasion detection?

How can deep learning models improve intrusion ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
73 views
0 votes
1 answer

How do I create multi-page printable reports from a Power BI dataset?

Creating multi-page, printable reports from a Power ...READ MORE

Jun 11 in Power BI by anonymous
• 36,180 points
127 views
0 votes
0 answers

How do quantitative risk models aid vulnerability management? [closed]

Quantitative risk models assess the potential impact ...READ MORE

Jun 13 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points

closed Jun 13 by Anupam 68 views
0 votes
1 answer

What are good practices for managing star schema in Power BI using Power Pivot?

1. Employ a Star Schema Structure That ...READ MORE

Jun 11 in Power BI by anonymous
• 36,180 points
140 views
0 votes
1 answer

How do I transform nested JSON API data into a tabular format in Power BI?

Because JSON responses frequently contain hierarchical structures ...READ MORE

Jun 10 in Power BI by anonymous
• 36,180 points
157 views
0 votes
1 answer

How do row-level security (RLS) settings interact with the Power Pivot model?

Row-Level Security (RLS) in Power BI provides ...READ MORE

Jun 11 in Power BI by anonymous
• 36,180 points
111 views
0 votes
1 answer

How can I optimize Power Pivot models for large datasets?

1. Data Modeling: Create a Star Diagram When ...READ MORE

Jun 11 in Power BI by anonymous
• 36,180 points
133 views
0 votes
1 answer

When should I use Paginated Reports over standard Power BI reports?

In certain situations where standard Power BI ...READ MORE

Jun 11 in Power BI by anonymous
• 36,180 points
110 views
0 votes
0 answers

Write a custom Hugging Face dataset loader for fine-tuning on a JSONL dataset.

Can i know Write a custom Hugging ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
99 views
0 votes
0 answers

How to implement a real-time embedding refresh mechanism for a semantic search pipeline.

Can i know How to implement a ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
98 views
0 votes
0 answers

Write a script to integrate LangChain’s VectorDB Retriever with FAISS/HNSW.

Can you let me know Write a ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
97 views
0 votes
0 answers

How do you implement multi-turn conversation fine-tuning using SFT with ChatML formatting?

With the help of proper examples of ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
94 views
0 votes
0 answers

Write a script to log perplexity metrics while training a decoder-only transformer.

Can you tell me Write a script ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
93 views
0 votes
0 answers

How do you modify a BART tokenizer to handle custom special tokens?

Can you tell me How do you ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
92 views
0 votes
1 answer

What is the difference between calculated columns and measures in Power Pivot?

The key difference between calculated columns and ...READ MORE

Jun 10 in Power BI by anonymous
• 36,180 points
142 views
0 votes
0 answers

How do you optimize Faiss/HNSW index refresh in real-time RAG applications?

Can i know with the help of ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
85 views
0 votes
1 answer

How do I define relationships between tables when there are multiple matching keys?

Only one active relationship between two tables ...READ MORE

Jun 11 in Power BI by anonymous
• 36,180 points
115 views
0 votes
0 answers

How do you use Bootstrap Your Own Latent (BYOL) for self-supervised multimodal learning?

With the help of code may i ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
91 views
0 votes
0 answers

how do i troubleshoot issues with duplicate rule matching in salesforce?

Can i know how do i troubleshoot ...READ MORE

Jun 12 in SalesForce by Ashutosh
• 33,350 points
87 views
0 votes
0 answers

why is my roll-up summary field not calculating correctly?

Can you tell me why is my ...READ MORE

Jun 12 in SalesForce by Ashutosh
• 33,350 points
86 views
0 votes
0 answers

How does bidirectional attention fusion improve sequence understanding in transformers?

May i know How does bidirectional attention ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
90 views
0 votes
0 answers

How do you use Faiss vs. Annoy for retrieval indexing in a RAG pipeline?

With the help of code can i ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
90 views
0 votes
0 answers

How do you compare SimCSE vs. TSDAE for sentence representation learning?

Can you tell me How do you ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
83 views
0 votes
0 answers

How does sparse pruning improve inference efficiency in transformers?

With the help of may i know ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
81 views
0 votes
1 answer

How to handle column type inconsistencies in Power BI transformations?

In Power BI, managing column-type inconsistencies is ...READ MORE

Jun 10 in Power BI by anonymous
• 36,180 points
126 views
0 votes
0 answers

How do you apply QLoRA to reduce LLM memory footprint without degrading performance?

Can you tell me How do you ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
80 views
0 votes
0 answers

How does on-demand weight loading optimize GPU VRAM for LLM hosting?

With the help of proper code example ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
72 views
0 votes
0 answers

How do you defend against adversarial perturbations in text classification models?

May i know How do you defend ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
78 views
0 votes
0 answers

How do you optimize distributed inference using DeepSpeed and vLLM?

Can you tell me with the help ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
78 views
0 votes
0 answers

How does dynamic embedding re-ranking enhance retrieval precision in QA systems?

Can you tell me How does dynamic ...READ MORE

Jun 12 in Generative AI by Ashutosh
• 33,350 points
76 views