Trending questions in Edureka Community

0 votes
0 answers

In a chatbot system, how can KV caching be optimized to reduce redundant computations?

With the help of code can i ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
373 views
0 votes
0 answers

How would you convert unstructured text data into a structured format for LLM fine-tuning?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
371 views
0 votes
1 answer
0 votes
1 answer

Is there any alternative to Nmap for UDP?

​While Nmap is a widely used tool ...READ MORE

Apr 4, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
815 views
0 votes
0 answers

How would you prevent unauthorized prompt injections in an API-based LLM service?

With the help of proper code example ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,350 points
334 views
0 votes
1 answer

How can I create a Power BI heatmap that dynamically adjusts based on filters?

Filters can dynamically affect the Power BI ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
634 views
0 votes
1 answer

How to create a directive that validates input fields based on regex patterns?

You can define a custom directive that ...READ MORE

Apr 10, 2025 in Node-js by anonymous
568 views
0 votes
0 answers

Modify a Hugging Face generate() function to improve real-time token streaming speed.

Can i know Modify a Hugging Face ...READ MORE

Apr 16, 2025 in Generative AI by Nidhi
• 16,260 points
317 views
0 votes
1 answer

How to implement a directive that adds tooltips to form controls dynamically?

Custom Tooltip Directive 1. Create the Directive import { ...READ MORE

Apr 10, 2025 in Angular by anonymous
539 views
0 votes
1 answer

How does Nessus perform vulnerability assessments?

​Nessus, developed by Tenable, is a widely ...READ MORE

Apr 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
500 views
0 votes
1 answer

What are the best enumeration countermeasures?

​Enumeration attacks involve malicious actors systematically probing ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
542 views
0 votes
1 answer

How can I use parameters to control API calls dynamically in Power Query?

Power Query can manage API calls dynamically ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
624 views
0 votes
1 answer

How to manage component lifecycle hooks for resource cleanup?

You manage component lifecycle hooks—especially ngOnDestroy()—to perform ...READ MORE

Apr 10, 2025 in Node-js by anonymous
556 views
0 votes
1 answer

How to develop a directive that restricts user input based on custom conditions?

To create an Angular directive that restricts ...READ MORE

Apr 10, 2025 in Node-js by anonymous
556 views
0 votes
1 answer

How do you generate real-time project analytics using Google Looker Studio?

Google Looker Studio’s role in lightweight analytics ...READ MORE

Apr 8, 2025 in PMP by Naira
613 views
0 votes
1 answer

What’s the best way to track sprint velocity trends using Domo?

Domo's approach to sprint velocity tracking allows ...READ MORE

Apr 8, 2025 in PMP by Naira
610 views
0 votes
0 answers

How can reinforcement learning be used to enforce ethical constraints on an AI chatbot?

Can you tell me How can reinforcement ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,350 points
303 views
0 votes
0 answers

How would you distill a 7B model into a 1.5B model while retaining key capabilities?

May i know How would you distill ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,350 points
309 views
0 votes
0 answers

How would you align token embeddings across two different LLMs for cross-model compatibility?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
342 views
0 votes
1 answer

How do I configure Power BI Service to use DirectQuery efficiently?

In order to optimize DirectQuery in the ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
600 views
0 votes
1 answer

How to create responsive tables using jQuery Mobile?

The most reliable and maintainable method for ...READ MORE

Apr 7, 2025 in Node-js by anonymous
648 views
0 votes
1 answer

How does AI-powered host discovery bypass firewalls?

​Traditional host discovery methods, such as ICMP ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
653 views
0 votes
1 answer

How do I convert semi-structured Excel files into a relational format for Power BI?

For semi-structured Excel files that have to ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
608 views
0 votes
1 answer

How to develop a directive that modifies element styles based on form validation status?

Here's a concise directive that automatically applies ...READ MORE

Apr 10, 2025 in Angular by anonymous
515 views
0 votes
0 answers

How can you ensure that sensitive data isn’t leaked in a RAG-based chatbot?

With the help of code can you ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,350 points
302 views
0 votes
1 answer

What are the best use cases for AI-powered chatbots in Project Portfolio Management (PPM)?

AI chatbots may be a useful digital ...READ MORE

Apr 8, 2025 in PMP by Naira
602 views
0 votes
0 answers

How would you design a generative model that self-corrects biased or hallucinated outputs?

With the help of code can you ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,350 points
298 views
0 votes
1 answer

How to implement grid layouts with nested columns in jQuery Mobile?

The most effective way to implement nested ...READ MORE

Apr 7, 2025 in Node-js by anonymous
639 views
0 votes
1 answer

How can I implement workspace security to control report access at a granular level?

To enforce detailed workspace security in Power ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
589 views
0 votes
1 answer

How to implement a directive that toggles element visibility with animations?

Custom Directive with Angular Animations 1. Define the ...READ MORE

Apr 10, 2025 in Node-js by anonymous
533 views
0 votes
1 answer

How to handle form submissions asynchronously in jQuery Mobile applications?

To effectively manage asynchronous form submissions in ...READ MORE

Apr 7, 2025 in Java-Script by anonymous
636 views
0 votes
1 answer

What is the role of NetBIOS enumeration in cyberattacks?

​NetBIOS (Network Basic Input/Output System) enumeration is ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
601 views
0 votes
0 answers

How would you integrate global and local attention for an optimized summarization model?

Can i know How would you integrate ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
329 views
0 votes
0 answers

How would you implement MoE to optimize inference efficiency while keeping model quality high?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
329 views
0 votes
4 answers

How to print objects of class using print function in Python?

You have to called the built in ...READ MORE

May 12, 2021 in Python by anonymous

edited Mar 5, 2025 81,332 views
0 votes
1 answer

How to lock cells in excel ?

To make a column non-editable: Select the whole ...READ MORE

Oct 18, 2022 in Others by narikkadan
• 86,360 points
39,626 views
0 votes
1 answer

Write code to quantize activations in a Transformer architecture using QLoRA.

You can quantize activations in a Transformer ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,350 points
483 views
+1 vote
1 answer

Why am I getting a 401 Unauthorized error when renaming a Power BI dataflow using the Power BI REST API, and how can I fix it?

A 401 Unauthorized error when renaming a ...READ MORE

Feb 27, 2025 in Power BI by anonymous
• 36,180 points
2,332 views
0 votes
0 answers

How can LLamaIndex be utilized to build an AI-powered recommendation system for e-commerce platforms?

May i know How can LLamaIndex be ...READ MORE

Apr 15, 2025 in Generative AI by Ashutosh
• 33,350 points
321 views
0 votes
1 answer

What role does SMB enumeration play in ransomware attacks?

​Server Message Block (SMB) enumeration is a ...READ MORE

Apr 9, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
548 views
0 votes
0 answers

How can I schedule automated data refresh with notification alerts?

How can I schedule automated data refresh ...READ MORE

Apr 16, 2025 in Power BI by pooja
• 24,450 points
272 views
0 votes
1 answer

How does AI automate enumeration attacks?

​Artificial Intelligence (AI) has revolutionized the landscape ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
504 views
0 votes
0 answers

Write code to implement stopword filtering for preprocessing text data for LLM tasks.

Can i know Write code to implement ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
314 views
0 votes
0 answers

Write a function to implement chunked dataset streaming for out-of-memory training on massive corpora.

May i know how to write a ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
314 views
0 votes
1 answer

How can I use a disconnected table to drive multiple visual interactions?

Using a disconnected table in Power BI ...READ MORE

Apr 1, 2025 in Power BI by Evanjalin
• 36,180 points
886 views
0 votes
0 answers

Can Asana handle Gantt chart dependencies, or do I need to integrate another tool?

I’m using Asana for project planning and ...READ MORE

Apr 14, 2025 in PMP by Parshvi
• 7,940 points
343 views
0 votes
1 answer

How to turn off the camera light on a laptop?

Here are general steps and specific instructions ...READ MORE

Nov 28, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
6,240 views
0 votes
1 answer

How can One-Shot Learning be used to detect signature forgery with minimal genuine signature samples for training?

You can use One-Shot Learning for signature ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,350 points
468 views
0 votes
1 answer

Why do I keep getting port scan attacks?

Experiencing frequent port scan alerts can be ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
623 views
0 votes
0 answers

Implement a multi-document summarization tool using LLamaIndex.

With the help of code can i ...READ MORE

Apr 15, 2025 in Generative AI by Ashutosh
• 33,350 points
309 views