Trending questions in Edureka Community

0 votes
1 answer

How to get an HTTPS certificate?

Securing communication between your application and its ...READ MORE

Nov 15, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
218 views
0 votes
1 answer

how to create a partial index with $exists: false condition?

In MongoDB, you can use the partialFilterExpression ...READ MORE

Nov 13, 2024 in Web Development by kavya
323 views
+1 vote
1 answer

How to invalidate a JWT token?

To invalidate a JWT token effectively, here ...READ MORE

Nov 7, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
524 views
0 votes
1 answer

What are practical methods to speed up the training of autoregressive models for text generation?

​You can refer to the following methods ...READ MORE

Nov 13, 2024 in Generative AI by Ashutosh
• 32,730 points
305 views
0 votes
1 answer

How would you migrate a legacy app to containers? Sample Dockerfile?

When moving a legacy app to containers, you have to check on ...READ MORE

Nov 14, 2024 in DevOps Tools by Gagana
• 10,070 points
257 views
0 votes
1 answer

How to check inode usage in Linux?

You can use the df command with ...READ MORE

Nov 13, 2024 in Web Development by kavya
313 views
0 votes
1 answer

How do you ensure data security when using cloud-based PM tools?

To ensure data security and compliance with ...READ MORE

Nov 13, 2024 in PMP by Sufi
277 views
0 votes
1 answer

How to convert CRT to PFX?

Converting a .crt (Certificate) file to a .pfx (Personal Information Exchange) ...READ MORE

Nov 13, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
290 views
0 votes
1 answer

How to decide when to use replicate sets for mongodb in production?

Here's a breakdown of when to consider ...READ MORE

Nov 13, 2024 in Web Development by kavya
310 views
0 votes
1 answer

How do I fix the 'too many SOQL queries: 101' error in Flow?

To fix the "Too many SOQL queries: ...READ MORE

Nov 11, 2024 in Cloud Computing by Sonu
509 views
0 votes
1 answer

How do you auto-trigger Jenkins builds from GitHub/GitLab?

To auto-trigger builds, make use of webhooks of your source control provider such as GitHub ...READ MORE

Nov 14, 2024 in DevOps Tools by Gagana
• 10,070 points
238 views
0 votes
1 answer

How does hashing work?

The technique of hashing converts any quantity ...READ MORE

Nov 11, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
361 views
0 votes
1 answer

How do you implement spectral normalization in GANs?

In order to implement spectral normalization in ...READ MORE

Nov 14, 2024 in Generative AI by amisha
249 views
0 votes
1 answer

What techniques can handle gradient accumulation to train large models on smaller GPUs?

You can use the following techniques to ...READ MORE

Nov 13, 2024 in Generative AI by Ashutosh
• 32,730 points
282 views
0 votes
1 answer

How do you implement batch normalization for stability when training GANs or VAEs?

​You can implement batch normalization for stability ...READ MORE

Nov 12, 2024 in Generative AI by Ashutosh
• 32,730 points

edited Nov 12, 2024 by Ashutosh 348 views
0 votes
1 answer

How can you send an AJAX request using jQuery?

The $.ajax() method will send an AJAX ...READ MORE

Nov 13, 2024 in Web Development by kavya
271 views
0 votes
1 answer

How do you implement GAN evaluation metrics like Inception Score (IS) or Fréchet Inception Distance (FID)?

You can implement GAN evaluation metrics like Inception ...READ MORE

Nov 12, 2024 in Generative AI by mona singh

edited Nov 12, 2024 by Ashutosh 321 views
0 votes
1 answer

How can you implement zero-shot learning in text generation using models like GPT?

You can easily implement Zero-short learning in ...READ MORE

Nov 12, 2024 in Generative AI by nidhi jha

edited Nov 12, 2024 by Ashutosh 321 views
0 votes
1 answer

What coding methods enable batching and padding optimization for variable-length sequences in transformers?

You can  handle batching and padding by ...READ MORE

Nov 14, 2024 in Generative AI by anil silori

edited Nov 14, 2024 by Ashutosh 246 views
0 votes
1 answer

How to hide code in HTML?

While it's impossible to completely hide HTML ...READ MORE

Nov 12, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
333 views
0 votes
1 answer

How can pipeline parallelism be implemented to train larger models across multiple machines?

Pipeline parallelism can be implemented by splitting ...READ MORE

Nov 13, 2024 in Generative AI by Ashutosh
• 32,730 points
269 views
0 votes
1 answer

What methods are effective for adaptive sampling to improve training efficiency in generative models?

You can refer to the following methods, ...READ MORE

Nov 13, 2024 in Generative AI by nidhi jha

edited Nov 13, 2024 by Ashutosh 273 views
0 votes
1 answer

How to find others WiFi password?

Understanding encryption methods and appropriate security standards ...READ MORE

Nov 11, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
352 views
0 votes
1 answer

What are the best ways to monitor the training stability of a GAN during coding?

The ways to monitor the training stability ...READ MORE

Nov 13, 2024 in Generative AI by nikil yadav
273 views
0 votes
1 answer

How can I enumerate SNMP information using tools like snmpwalk?

Using tools like snmpwalk to enumerate SNMP ...READ MORE

Nov 18, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
307 views
+1 vote
3 answers

Best way to combine multiple file with multiple same tabs?

Because one might have to combine multiple ...READ MORE

Nov 26, 2024 in Power BI by Gagana
• 10,070 points
319 views
0 votes
0 answers

How is IP address spoofing detected?

I'm researching network security and want to ...READ MORE

Nov 15, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
219 views
0 votes
1 answer

What LDAP query can be used to enumerate all users in a directory?

Creating an LDAP search query with the ...READ MORE

Nov 18, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
305 views
0 votes
0 answers

How do I chain asynchronous AJAX calls with promises in jQuery to ensure proper order when modifying the DOM?

How do I chain asynchronous AJAX calls ...READ MORE

Nov 13, 2024 in Web Development by Nidhi
• 16,260 points
299 views
0 votes
1 answer

How overlay two pictures to another using HTML-CSS?

Overlaying two pictures on top of another ...READ MORE

Nov 13, 2024 in Web Development by kavya
279 views
0 votes
0 answers

Can I switch my career from QA testing to DevOps?

Can I able to switch my career ...READ MORE

Oct 25, 2024 in DevOps Tools by Anila
• 5,070 points

recategorized Oct 29, 2024 by Anila 234 views
0 votes
1 answer

How do you handle conflicts between Scrum team members?

To handle conflicts between Scrum team members consider ...READ MORE

Nov 13, 2024 in PMP by Anu
295 views
0 votes
1 answer

How does Docker handle file system layers and image caching?

Docker really helps in managing filesystem layers and image caching ...READ MORE

Nov 21, 2024 in DevOps Tools by Gagana
• 10,070 points
253 views
0 votes
1 answer

How does a CSRF token work?

Let's examine the creation, validation, and verification ...READ MORE

Nov 11, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
341 views
0 votes
1 answer

How to create a Node.js project?

You can follow the following steps to ...READ MORE

Nov 13, 2024 in Web Development by kavya
270 views
0 votes
1 answer

How do you handle difficult stakeholders?

Handling Difficult Stakeholders: Understand Their Perspective: Listen to ...READ MORE

Nov 13, 2024 in PMP by Diya
285 views
0 votes
1 answer

How do you handle resource contention when multiple jobs run simultaneously in CI/CD pipelines?

I address resource contention in CI/CD pipelines ...READ MORE

Nov 18, 2024 in DevOps Tools by Gagana
• 10,070 points
332 views
0 votes
1 answer

How to create a service file in Angular?

To create a service file in Angular, ...READ MORE

Nov 13, 2024 in Web Development by kavya
268 views
0 votes
1 answer

What are common performance bottlenecks in Docker containers, and how can I address them?

Docker containers can suffer from numerous performance-related issues. I identify and resolve them as ...READ MORE

Nov 18, 2024 in DevOps Tools by Gagana
• 10,070 points
329 views
0 votes
0 answers

How to prevent XSS attacks in JavaScript?

I’m concerned about protecting my web application ...READ MORE

Nov 13, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,320 points
248 views
0 votes
1 answer
0 votes
1 answer

How can you apply a transition effect in CSS?

In CSS, you can apply a transition ...READ MORE

Nov 13, 2024 in Web Development by kavya
234 views
0 votes
1 answer

How would you securely manage secrets in Terraform? Any examples with Vault or AWS Secrets?

Using HashiCorp Vault with Terraform Store a Secret ...READ MORE

Nov 13, 2024 in DevOps Tools by Gagana
• 10,070 points
260 views
0 votes
1 answer

What are the DevOps implementation challenges at your organization?

The challenges in implementing DevOps vary from ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 10,070 points
309 views
0 votes
1 answer

How to create a data source?

Creating a Data Source in a Database ...READ MORE

Nov 13, 2024 in Web Development by kavya
258 views
0 votes
1 answer

How do you integrate project management tools with CRM platforms?

To integrate project management tools with CRM ...READ MORE

Nov 13, 2024 in PMP by John
274 views
0 votes
1 answer

How do you use unsupervised pre-training to enhance the performance of generative models?

You can use unsupervised pre-training to enhance ...READ MORE

Nov 12, 2024 in Generative AI by Harsh Yadav
283 views
0 votes
1 answer

Salesforce Skuid Error: Insufficient Access Rights On Object ID

The "Insufficient Access Rights On Object ID" ...READ MORE

Nov 18, 2024 in Cloud Computing by Rajesh
316 views
+2 votes
2 answers

What are effective methods for version control and deployment of Power BI reports?

Incorporating best practices in version control and ...READ MORE

Oct 22, 2024 in Power BI by pooja
• 24,450 points
418 views
0 votes
1 answer

How can I extract sensitive information from SNMP-enabled devices?

Understanding possible vulnerabilities and configurations can be ...READ MORE

Nov 18, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
274 views