Trending questions in Edureka Community

0 votes
1 answer

How to design a pipe that accepts configuration options for flexible transformations?

Angular Pipe Implementation import { Pipe, PipeTransform } ...READ MORE

Apr 17 in Node-js by anonymous
142 views
0 votes
1 answer

How to utilize JsonPipe to debug complex objects in templates?

Use JsonPipe in Angular templates to convert ...READ MORE

Apr 16 in Node-js by anonymous
158 views
0 votes
1 answer

How does SMB signing affect CPU usage on both clients and servers?

​SMB (Server Message Block) signing enhances data ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
168 views
0 votes
1 answer

What reason would you use the decoy scan option for Nmap?

The --decoy option in Nmap is designed ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
181 views
0 votes
1 answer

How to chain pipes to format and truncate strings in Angular templates?

In Angular templates, you can chain pipes ...READ MORE

Apr 16 in Node-js by anonymous
155 views
0 votes
1 answer

How do you set up automated notifications in Microsoft Project Online for delayed tasks?

Automating notifications for delayed activities in Microsoft ...READ MORE

Apr 15 in PMP by Naira
170 views
0 votes
0 answers
0 votes
1 answer

How to develop a pipe that formats credit card numbers with masking?

To develop a pipe that formats and ...READ MORE

Apr 17 in Laravel by anonymous
133 views
0 votes
0 answers

How do I add a hyperlink to a tooltip?

Can you tell me How do I ...READ MORE

Apr 17 in Node-js by Ashutosh
• 32,530 points
107 views
0 votes
1 answer

How to use multiple pipes to transform and filter arrays in templates?

Chain multiple pipes in Angular templates by ...READ MORE

Apr 17 in Node-js by anonymous
133 views
0 votes
1 answer

How is activity sequencing different in Agile vs Waterfall?

Activity sequencing is an important aspect of ...READ MORE

Apr 15 in PMP by Naira
149 views
0 votes
1 answer

What is TCP Connect scanning, and when is it used?

​TCP Connect scanning is a fundamental port ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
173 views
0 votes
1 answer

How do I monitor schedule variance (SV) in Microsoft Project?

Schedule Variance (SV) is a project performance ...READ MORE

Apr 15 in PMP by Naira
147 views
0 votes
1 answer

How to combine DatePipe and CurrencyPipe to display formatted transaction details?

In Angular templates, combine DatePipe and CurrencyPipe ...READ MORE

Apr 16 in Node-js by anonymous
146 views
0 votes
1 answer

How do I integrate Slack alerts for key milestones using Zapier automation?

Integrating Slack notifications for major milestones with ...READ MORE

Apr 15 in PMP by Naira
164 views
0 votes
1 answer

How to handle exceptions within a custom pipe's transform method gracefully?

To handle exceptions gracefully within a custom ...READ MORE

Apr 17 in Node-js by anonymous
130 views
0 votes
1 answer

Can I integrate Confluence meeting notes with my JIRA sprints?

Yes, you can link Confluence meeting notes ...READ MORE

Apr 15 in PMP by Naira
146 views
0 votes
1 answer

What’s the most effective way to manage RAID logs in Notion?

Managing RAID logs (Risks, Assumptions, Issues, and ...READ MORE

Apr 15 in PMP by Naira
161 views
0 votes
1 answer

Is it possible to manage backlog grooming in GitLab project boards?

Yes, you can use GitLab's project boards ...READ MORE

Apr 15 in PMP by Naira
150 views
0 votes
1 answer

How do you automate retrospective templates in Miro?

Miro is a popular online communication tool ...READ MORE

Apr 15 in PMP by Naira
143 views
0 votes
1 answer

Can I build a sprint velocity trend chart in Google Data Studio?

Yes, you can use Google Data Studio ...READ MORE

Apr 15 in PMP by Naira
141 views
0 votes
1 answer

What is the role of OID values in SNMP enumeration?

​Object Identifiers (OIDs) are fundamental in Simple ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
162 views
0 votes
1 answer

What’s the best way to manage dependencies across multiple sprints in JIRA Advanced Roadmaps?

Jira Advanced Roadmaps are one of the ...READ MORE

Apr 15 in PMP by Naira
155 views
0 votes
1 answer

How can I integrate JIRA with Confluence to streamline Agile project documentation?

Integrating JIRA and Confluence can dramatically improve ...READ MORE

Apr 15 in PMP by Naira
155 views
0 votes
1 answer

What are countermeasures against VoIP enumeration attacks?

To prevent SIP endpoint and extension enumeration ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
147 views
0 votes
0 answers

Write a Python script to implement a byte pair encoding (BPE) tokenizer from scratch.

With the help of code can i ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 32,530 points
128 views
0 votes
1 answer

How can ClickUp be used to set up a project governance framework?

ClickUp provides a variety of customizable features ...READ MORE

Apr 15 in PMP by Naira
152 views
0 votes
0 answers

Write a Python server that streams LLM responses using WebSockets.

Can you Write a Python server that ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,140 points
125 views
0 votes
1 answer

Can DNS zone transfers be used for attacks other than enumeration?

DNS zone transfers (AXFR) are legitimate mechanisms ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
156 views
0 votes
1 answer

How does NTP enumeration help in time-based attacks?

​Network Time Protocol (NTP) enumeration can assist ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
140 views
0 votes
1 answer

What is the difference between hping2 and Hping3?

Hping2 vs. Hping3: Key Differences in Features, ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
154 views
0 votes
0 answers

Implement a Python script to connect an LLM with a FAISS-based vector store.

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 32,530 points
122 views
0 votes
0 answers

How to Implement a 4-bit quantization strategy using bitsandbytes for efficient inference.

Can you tell me How to Implement ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 32,530 points
120 views
0 votes
0 answers

How to Implement a flash attention module for a Transformer model in PyTorch.

May i know How to Implement a ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 32,530 points
120 views
0 votes
1 answer

What role does SPI (Schedule Performance Index) play in forecasting delays?

SPI (timetable Performance Index) is a project ...READ MORE

Apr 15 in PMP by Naira
133 views
0 votes
1 answer

What is the biggest security concern with SNMP?

​The most critical security risk associated with ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
134 views
0 votes
1 answer

Who are the three main participants in the man in the middle attack?

​In a Man-in-the-Middle (MitM) attack, three primary ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
134 views
0 votes
1 answer

What’s the difference between burndown and burnup charts in Scrum dashboards?

Burndown and burnup charts are crucial Scrum ...READ MORE

Apr 15 in PMP by Naira
141 views
0 votes
1 answer

How to create an attribute directive that changes element behavior on hover events?

You can follow this example. This directive ...READ MORE

Apr 10 in Java-Script by anonymous
340 views
0 votes
1 answer

How can you extract data using NetBIOS Name Service (NBNS)?

NetBIOS Name Service (NBNS), also known as ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
147 views
0 votes
1 answer

What is active vs passive enumeration, and when is each used?

Active vs. Passive Enumeration: Understanding the Differences ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
175 views
0 votes
1 answer

How do you establish OKR tracking in Notion or ClickUp?

OKRs (Objectives and Key Results) are an ...READ MORE

Apr 15 in PMP by Naira
127 views
0 votes
1 answer

How do you calculate project float manually vs. using a tool?

Project float (or slack) refers to the ...READ MORE

Apr 15 in PMP by Naira
127 views
0 votes
1 answer

How do you generate dynamic Gantt charts with real-time task dependencies in Smartsheet?

Smartsheet offers dynamic Gantt charts that visually ...READ MORE

Apr 14 in PMP by Naira
167 views
0 votes
1 answer

Design a workflow to generate context-aware embeddings for legal document indexing in LLamaIndex.

You can generate context-aware embeddings for legal ...READ MORE

Apr 21 in Generative AI by mimi
126 views
0 votes
1 answer

What indicates that a port is closed during a stealth scan?

​In a stealth scan, such as Nmap's ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
142 views
0 votes
1 answer

How can you embed Agile KPIs into a project dashboard?

Adding Agile Key Performance Indicators (KPIs) to ...READ MORE

Apr 15 in PMP by Naira
117 views
0 votes
1 answer

Can you explain three-point estimation with real examples in IT projects?

Three-point estimation is a strategy for estimating ...READ MORE

Apr 15 in PMP by Naira
122 views
0 votes
1 answer

What strategies can you implement for resolving embedding mismatches in LLamaIndex?

You can resolve embedding mismatches in LlamaIndex ...READ MORE

Apr 21 in Generative AI by nimona
122 views
0 votes
1 answer

How does active fingerprinting reveal OS details?

Active OS fingerprinting is a technique used ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
139 views