Trending questions in Edureka Community

0 votes
0 answers

What is function in MS Excel?

What is function in MS Excel? READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
1,022 views
0 votes
0 answers

I have a very long list of datetime strings like these:

["Jun 1 2005 1:33PM", "Aug 28 1999 ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
998 views
0 votes
0 answers

What is threat in cyber security

Hi, My company takes cybersecurity very seriously and ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
982 views
0 votes
0 answers

what is information security analyst

What does the role of an information ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
968 views
0 votes
0 answers

what is search engine marketing in digital marketing?

Can someone explain digital marketing wrt to ...READ MORE

Sep 13, 2023 in Digital Marketing by anonymous
• 470 points
685 views
0 votes
0 answers

Please tell me where to find chrome driver to support chrome browser Version 116.0.5845.188 .

Chrome driver used :114 Chrome browser :Version 116.0.5845.188 Selenium ...READ MORE

Sep 19, 2023 in Selenium by dildilshani

edited Mar 5, 2025 427 views
0 votes
0 answers

what does cybersecurity protect?

Sep 4, 2023 in Cyber Security & Ethical Hacking by Rajarshi
• 470 points
929 views
0 votes
0 answers

what does a cyber security analyst do

What are the primary responsibilities and roles ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
922 views
0 votes
0 answers

What does %s in a Python format string mean?

For example, in the below code if len(sys.argv) ...READ MORE

Sep 5, 2023 in Python by Satyawrat
• 460 points
990 views
0 votes
0 answers

why is computer security important

What are the key reasons for the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
898 views
0 votes
0 answers

what is nist cybersecurity framework

What does the NIST (National Institute of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
882 views
0 votes
0 answers

What is print(f"...") ?

I'm looking at a Python script that ...READ MORE

Sep 18, 2023 in Python by Satyawrat
• 460 points

edited Mar 5, 2025 388 views
0 votes
0 answers

what is attack in information security

What is the concept of an 'attack' ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
865 views
0 votes
0 answers

How does super() operate in the presence of multiple inheritance? As an example, consider the following:

class First(object): def __init__(self): ...READ MORE

Sep 6, 2023 in Python by Satyawrat
• 460 points
903 views
+1 vote
3 answers

3 dot in parameter in Java

The "Three Dots" in java is called ...READ MORE

Nov 22, 2018 in Java by geek.erkami
• 2,680 points
59,993 views
0 votes
0 answers

I need code to count syllables in words, like "hairy" having two syllables. My code works but fails for "HAIRY," which has only one syllable.

def syllable_count(word): count = ...READ MORE

Sep 18, 2023 in Python by Satyawrat
• 460 points

edited Mar 5, 2025 361 views
0 votes
0 answers

What is print(f"...")

I'm looking at a Python script that ...READ MORE

Sep 18, 2023 in Python by Satyawrat
• 460 points

edited Mar 5, 2025 360 views
0 votes
0 answers

what is risk in cyber security

Hello, we are in the process of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
838 views
0 votes
0 answers

what is wireshark in cyber security

What is the role and significance of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
833 views
0 votes
0 answers

how criminals plan the attacks in cyber security

Could you provide an in-depth explanation of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
822 views
0 votes
0 answers

what is spear phishing in cyber security

What does the term 'spear phishing' mean ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
816 views
0 votes
0 answers

how to stop cyber crime

Recently, a member of my family had ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
801 views
0 votes
0 answers

How to sort a dictionary using key?

Example input: {2:3, 1:89, 4:5, 3:0} Desired output: {1:89, 2:3, ...READ MORE

Sep 4, 2023 in Python by Satyawrat
• 460 points
910 views
0 votes
0 answers

How do I use Python to change YOLO format comments to x1, y1, x2, y2 coordinates?

I want to know how to change ...READ MORE

Sep 16, 2023 in Python by Satyawrat
• 460 points

edited Mar 5, 2025 402 views
0 votes
0 answers

what is cyber security policy

What does the term 'cybersecurity policy' refer ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
792 views
0 votes
1 answer

ChatGPT showing blank white page after login

If you're seeing a blank white page, ...READ MORE

Apr 18, 2023 in ChatGPT by anonymous
• 1,420 points
7,414 views
0 votes
0 answers

what is security in information security

What does the term 'security' signify within ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
788 views
0 votes
0 answers

what is data breach in cyber security

What constitutes a 'data breach' within the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
776 views
0 votes
0 answers

what is snort in cyber security

What is the significance of 'Snort' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
776 views
0 votes
1 answer

Difference between $(window).load() and $(document).ready() functions

The key difference between $(document). ready() and ...READ MORE

Jun 17, 2022 in JQuery by rajatha
• 7,680 points
20,057 views
0 votes
3 answers

What are the different ways to select an option from a dropdown using Selenium Webdriver?

So follow this steps for solution: First click ...READ MORE

Dec 16, 2020 in Selenium by Roshni
• 10,440 points
55,075 views
0 votes
0 answers

what is cyber crime and how to prevent it?

"What are the key characteristics and categories ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 400 views
0 votes
0 answers

Is it okay for general applications to use the RuntimeError exception?

raise RuntimeError('config file is missing host address') I've ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
750 views
0 votes
0 answers

what is iso in cyber security?

What role does ISO (International Organization for ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 394 views
0 votes
0 answers

what is threat intelligence in cyber security

What is meant by 'threat intelligence' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
748 views
0 votes
0 answers

why do we need cyber security

I'm now enrolled in a course on ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
746 views
0 votes
0 answers

what is cyberspace in cyber security

What constitutes 'cyberspace' within the realm of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
745 views
0 votes
0 answers

How do I learn digital marketing?

Aug 31, 2023 in Digital Marketing by Rajarshi
• 470 points
1,022 views
0 votes
0 answers

what is reactjs used for?

What are the practical applications and use ...READ MORE

Sep 15, 2023 in Java-Script by Edureka
• 12,730 points

edited Mar 5, 2025 363 views
0 votes
0 answers

what is cyber risk management?

"How does cyber risk management play a ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 364 views
0 votes
0 answers

what is pmp certification

Sep 4, 2023 in PMP by Saniya
• 3,360 points
710 views
0 votes
0 answers

what does a information security analyst do?

"What are the primary responsibilities and daily ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 356 views
0 votes
0 answers

how to use cyber security?

"How can organizations effectively implement and integrate ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 353 views
0 votes
0 answers

how to protect cyber security?

How can businesses effectively fortify their cybersecurity ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 351 views
0 votes
0 answers

what is cia in cyber security

Hi, According to the OSG, privacy and security ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
702 views
0 votes
0 answers

why is cybercrime increasing?

What are the underlying factors and trends ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 333 views
0 votes
0 answers

what is information technology security

What is security in information technology, and ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 325 views
0 votes
0 answers

how long does it take to learn cyber security?

What factors influence the time it takes ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 322 views
0 votes
0 answers

How to GET data from API and show it on PHP page?

I want to use some data from ...READ MORE

Jul 31, 2022 in PHP by Kithuzzz
• 38,000 points
13,479 views
0 votes
0 answers

How to do PMP certification?

What is the step-by-step process for obtaining ...READ MORE

Sep 15, 2023 in PMP by Saniya
• 3,360 points

edited Mar 5, 2025 319 views