Trending questions in Edureka Community

0 votes
0 answers

Write a Python script to implement a byte pair encoding (BPE) tokenizer from scratch.

With the help of code can i ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
299 views
0 votes
1 answer

How to use host bindings to bind properties to the host element in a component?

In Angular (2+), the @HostBinding() decorator allows ...READ MORE

Apr 10 in Node-js by anonymous
547 views
0 votes
1 answer

How can you embed Agile KPIs into a project dashboard?

Adding Agile Key Performance Indicators (KPIs) to ...READ MORE

Apr 15 in PMP by Naira
305 views
0 votes
0 answers
0 votes
1 answer

How do I design a scatter plot where the axes change dynamically based on user selection?

The design of a scatter plot inside ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
604 views
0 votes
1 answer

Write a script to log validation perplexity during QLoRA training.

You can log validation perplexity during QLoRA ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
495 views
0 votes
1 answer

How do you identify open ports using Masscan?

Masscan is a high-performance, open-source port scanner ...READ MORE

Apr 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
648 views
0 votes
0 answers

What are the best practices for deploying TPU-trained models to production systems?

Can you explian to me What are ...READ MORE

Apr 8 in Generative AI by Ashutosh
• 33,350 points
643 views
0 votes
0 answers

Write a Python server that streams LLM responses using WebSockets.

Can you Write a Python server that ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
287 views
0 votes
1 answer

What’s the best way to use REST APIs for syncing data between Jira and SAP ERP?

Jira-SAP ERP integration enhances the alignment between ...READ MORE

Apr 8 in PMP by Naira

reshown Apr 8 by Neelam 595 views
0 votes
0 answers

How would you prevent unauthorized prompt injections in an API-based LLM service?

With the help of proper code example ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
297 views
0 votes
0 answers

How would you convert unstructured text data into a structured format for LLM fine-tuning?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
328 views
0 votes
1 answer

How do you set up Kanban WIP limits in Trello for Agile teams?

Setting WIP (Work In Progress) limitations in ...READ MORE

Apr 8 in PMP by anonymous
613 views
0 votes
1 answer

Create a function for custom parameter initialization in QLoRA fine-tuning.

You can create a custom parameter initialization ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
484 views
0 votes
1 answer

How do you implement auto-scheduling constraints in Microsoft Project for large-scale projects?

Microsoft Project’s auto-scheduling feature enables complicated timetables ...READ MORE

Apr 8 in PMP by Naira
616 views
0 votes
1 answer

How do attackers bypass SNMP security restrictions?

​Attackers can bypass SNMP (Simple Network Management ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
337 views
0 votes
0 answers

How to implement speculative decoding for a multi-turn chatbot using a small draft model.

Can you tell me How to implement ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
319 views
0 votes
0 answers

In a chatbot system, how can KV caching be optimized to reduce redundant computations?

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
318 views
0 votes
1 answer

How does Xmas scanning evade firewall detection?

​Xmas scans are a type of TCP ...READ MORE

Apr 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
630 views
0 votes
1 answer

Create a pipeline for end-to-end QLoRA fine-tuning using PyTorch Lightning.

You can create an end-to-end QLoRA fine-tuning ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
474 views
0 votes
1 answer

How does DNSSEC zone walking expose subdomains?

​DNSSEC (Domain Name System Security Extensions) aims ...READ MORE

Apr 9 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
542 views
0 votes
1 answer

What’s the best way to use automated speech-to-text meeting minutes in Otter.ai for Agile teams?

Using Otter.ai for Agile teams may greatly ...READ MORE

Apr 8 in PMP by Naira

reshown Apr 8 by Neelam 574 views
0 votes
1 answer

How to create a directive that validates input fields based on regex patterns?

You can define a custom directive that ...READ MORE

Apr 10 in Node-js by anonymous
514 views
0 votes
1 answer

How do you integrate Miro Boards with Jira for backlog refinement?

Integrating Miro with Jira transforms Agile teams ...READ MORE

Apr 8 in PMP by Naira
571 views
0 votes
1 answer

How do I create a dynamic column in Power Query that calculates based on multiple conditions?

To create a dynamic column in Power ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
574 views
0 votes
1 answer

How do I create a timeline visualization that shows overlapping events clearly?

Custom visualizations such as Gantt Chart or ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
568 views
0 votes
0 answers

How does idle scanning work in Nmap?

Idle scanning is a stealth technique used ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
354 views
0 votes
1 answer

How to implement a directive that manages focus on dynamically added elements?

To implement a directive that manages focus ...READ MORE

Apr 10 in Angular by anonymous
479 views
0 votes
0 answers

Modify a Hugging Face generate() function to improve real-time token streaming speed.

Can i know Modify a Hugging Face ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
254 views
0 votes
0 answers

How would you align token embeddings across two different LLMs for cross-model compatibility?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
299 views
0 votes
1 answer
0 votes
1 answer

How can Monte Carlo simulations be applied for project risk forecasting in @Risk for Excel?

Monte Carlo simulations are one of the ...READ MORE

Apr 8 in PMP by Naira
589 views
0 votes
1 answer

How to prevent default scrolling behavior during touch events in jQuery Mobile?

To prevent the default scrolling behavior during ...READ MORE

Apr 10 in Node-js by anonymous
501 views
0 votes
3 answers

Setting JAVA_HOME in linux

Hello fellow techies, Assuming you use bash shell ...READ MORE

Dec 10, 2020 in Linux Administration by Rajiv
• 8,870 points
80,968 views
0 votes
0 answers

How can reinforcement learning be used to enforce ethical constraints on an AI chatbot?

Can you tell me How can reinforcement ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
251 views
0 votes
0 answers

How would you distill a 7B model into a 1.5B model while retaining key capabilities?

May i know How would you distill ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
258 views
0 votes
1 answer

How can I use parameters to control API calls dynamically in Power Query?

Power Query can manage API calls dynamically ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
561 views
0 votes
0 answers

How would you design a generative model that self-corrects biased or hallucinated outputs?

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
254 views
0 votes
1 answer

How does Nessus perform vulnerability assessments?

​Nessus, developed by Tenable, is a widely ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
431 views
0 votes
1 answer

How can I create a Power BI heatmap that dynamically adjusts based on filters?

Filters can dynamically affect the Power BI ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
556 views
0 votes
0 answers

How would you integrate global and local attention for an optimized summarization model?

Can i know How would you integrate ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
287 views
0 votes
1 answer

What’s the best way to track critical chain project management (CCPM) using Smartsheet?

Tracking CCPM with Smartsheet requires some setup, ...READ MORE

Apr 8 in PMP by Naira
577 views
0 votes
1 answer

What’s the best way to track sprint velocity trends using Domo?

Domo's approach to sprint velocity tracking allows ...READ MORE

Apr 8 in PMP by Naira
548 views
0 votes
1 answer

How to develop a directive that restricts user input based on custom conditions?

To create an Angular directive that restricts ...READ MORE

Apr 10 in Node-js by anonymous
489 views
0 votes
1 answer

How to manage component lifecycle hooks for resource cleanup?

You manage component lifecycle hooks—especially ngOnDestroy()—to perform ...READ MORE

Apr 10 in Node-js by anonymous
488 views
0 votes
0 answers

How can you ensure that sensitive data isn’t leaked in a RAG-based chatbot?

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
250 views
0 votes
0 answers
0 votes
1 answer

How to implement a directive that toggles element visibility with animations?

Custom Directive with Angular Animations 1. Define the ...READ MORE

Apr 10 in Node-js by anonymous
485 views
0 votes
1 answer

How can AI-powered workload forecasting be configured in Wrike?

Wrike's AI tools are excellent for estimating ...READ MORE

Apr 8 in PMP by Naira
568 views