Trending questions in Edureka Community

0 votes
1 answer

How does Shodan assist in OS discovery?

​Shodan assists in operating system (OS) discovery ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
786 views
0 votes
1 answer

Write a script to log validation perplexity during QLoRA training.

You can log validation perplexity during QLoRA ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,370 points
671 views
0 votes
1 answer

What’s the best way to use automated speech-to-text meeting minutes in Otter.ai for Agile teams?

Using Otter.ai for Agile teams may greatly ...READ MORE

Apr 8, 2025 in PMP by Naira

reshown Apr 8, 2025 by Neelam 773 views
0 votes
1 answer

What are the best practices to avoid my server being port scanned?

​Port scanning is a technique used by ...READ MORE

Apr 4, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
955 views
0 votes
1 answer

What’s the best way to use REST APIs for syncing data between Jira and SAP ERP?

Jira-SAP ERP integration enhances the alignment between ...READ MORE

Apr 8, 2025 in PMP by Naira

reshown Apr 8, 2025 by Neelam 772 views
0 votes
1 answer

How does AI-powered host discovery bypass firewalls?

​Traditional host discovery methods, such as ICMP ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
823 views
0 votes
1 answer

What are the best enumeration countermeasures?

​Enumeration attacks involve malicious actors systematically probing ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
694 views
+1 vote
2 answers

Are there any security considerations when using R or Python scripts in Power BI?

Using R or Python scripts on Power BI has certain security risks , ...READ MORE

Jan 23, 2025 in Power BI by anonymous
• 36,180 points
1,836 views
0 votes
0 answers

Selenium Project : Support

Hi I have knowledge in Selenium and ...READ MORE

Apr 9, 2025 in Selenium by RICHA
• 140 points
786 views
0 votes
0 answers

How do I generate real-time dashboards in Monday.com for stakeholder reporting?

I’m trying to build real-time dashboards in ...READ MORE

Apr 14, 2025 in PMP by Parshvi
• 7,940 points
536 views
0 votes
1 answer

How to implement a directive that adds tooltips to form controls dynamically?

Custom Tooltip Directive 1. Create the Directive import { ...READ MORE

Apr 10, 2025 in Angular by anonymous
682 views
0 votes
0 answers

How to Implement a 4-bit quantization strategy using bitsandbytes for efficient inference.

Can you tell me How to Implement ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
458 views
0 votes
1 answer

What’s the best way to track critical chain project management (CCPM) using Smartsheet?

Tracking CCPM with Smartsheet requires some setup, ...READ MORE

Apr 8, 2025 in PMP by Naira
792 views
0 votes
1 answer

How do you generate real-time project analytics using Google Looker Studio?

Google Looker Studio’s role in lightweight analytics ...READ MORE

Apr 8, 2025 in PMP by Naira
760 views
0 votes
0 answers

How would you preprocess a multi-lingual dataset for fine-tuning an LLM while preserving special tokens?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
498 views
0 votes
1 answer
0 votes
1 answer

How to customize the default theme in jQuery Mobile CSS Framework?

Manual CSS Overrides Create a custom CSS file ...READ MORE

Apr 7, 2025 in Java-Script by anonymous
801 views
0 votes
1 answer

What is the role of NetBIOS enumeration in cyberattacks?

​NetBIOS (Network Basic Input/Output System) enumeration is ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
765 views
0 votes
1 answer

How can Monte Carlo simulations be applied for project risk forecasting in @Risk for Excel?

Monte Carlo simulations are one of the ...READ MORE

Apr 8, 2025 in PMP by Naira
782 views
0 votes
1 answer

How do attackers bypass SNMP security restrictions?

​Attackers can bypass SNMP (Simple Network Management ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
505 views
0 votes
1 answer

What is the correct MIME type for uploading MS Excel XLSX files when using the Vertex AI API?

The correct MIME type for uploading XLSX ...READ MORE

Mar 12, 2025 in Generative AI by to me
1,923 views
0 votes
0 answers

Implement a Python script to connect an LLM with a FAISS-based vector store.

With the help of code can you ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
441 views
0 votes
0 answers
0 votes
1 answer

Create a function for custom parameter initialization in QLoRA fine-tuning.

You can create a custom parameter initialization ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,370 points
643 views
0 votes
0 answers

Write a Python script to implement a byte pair encoding (BPE) tokenizer from scratch.

With the help of code can i ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
439 views
0 votes
0 answers

How to run a Python 3 script in OWASP ZAP?

OWASP ZAP is a security testing tool ...READ MORE

Mar 5, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
2,224 views
0 votes
1 answer

How can you embed Agile KPIs into a project dashboard?

Adding Agile Key Performance Indicators (KPIs) to ...READ MORE

Apr 15, 2025 in PMP by Naira
443 views
0 votes
1 answer

What are the implications of incomplete retrospectives on team performance?

Retrospectives are an important Agile ceremony that ...READ MORE

Apr 15, 2025 in PMP by Naira
442 views
0 votes
0 answers

Write a script to map the embeddings of two LLMs with different tokenizer vocabularies.

Can i know Write a script to ...READ MORE

Apr 15, 2025 in Generative AI by Ashutosh
• 33,370 points
480 views
0 votes
1 answer

How can I create a Power BI heatmap that dynamically adjusts based on filters?

Filters can dynamically affect the Power BI ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
747 views
0 votes
0 answers

Write a Python server that streams LLM responses using WebSockets.

Can you Write a Python server that ...READ MORE

Apr 16, 2025 in Generative AI by Nidhi
• 16,260 points
432 views
0 votes
1 answer

How can spoofing attacks be prevented?

​Spoofing attacks involve impersonating trusted entities to ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
490 views
0 votes
1 answer

How to handle form submissions asynchronously in jQuery Mobile applications?

To effectively manage asynchronous form submissions in ...READ MORE

Apr 7, 2025 in Java-Script by anonymous
784 views
0 votes
1 answer

How do I convert semi-structured Excel files into a relational format for Power BI?

For semi-structured Excel files that have to ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
743 views
0 votes
1 answer

How to create a directive that validates input fields based on regex patterns?

You can define a custom directive that ...READ MORE

Apr 10, 2025 in Node-js by anonymous
677 views
0 votes
1 answer

How to implement grid layouts with nested columns in jQuery Mobile?

The most effective way to implement nested ...READ MORE

Apr 7, 2025 in Node-js by anonymous
780 views
0 votes
0 answers

How to Implement a flash attention module for a Transformer model in PyTorch.

May i know How to Implement a ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
428 views
0 votes
1 answer

How can I use parameters to control API calls dynamically in Power Query?

Power Query can manage API calls dynamically ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
742 views
–1 vote
1 answer

How to uncover blacked-out text?

Understanding Redaction Methods Before diving into techniques, it's ...READ MORE

Nov 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
6,527 views
0 votes
0 answers
0 votes
1 answer

How to manage component lifecycle hooks for resource cleanup?

You manage component lifecycle hooks—especially ngOnDestroy()—to perform ...READ MORE

Apr 10, 2025 in Node-js by anonymous
669 views
0 votes
1 answer

How do I configure Power BI Service to use DirectQuery efficiently?

In order to optimize DirectQuery in the ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
722 views
+1 vote
2 answers
0 votes
0 answers

How to implement speculative decoding for a multi-turn chatbot using a small draft model.

Can you tell me How to implement ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
462 views
0 votes
0 answers

Develop a generative AI system that reviews Python code and suggests optimizations.

Can you tell me Develop a generative ...READ MORE

Apr 16, 2025 in Generative AI by Nidhi
• 16,260 points
412 views
0 votes
1 answer

Why do I keep getting port scan attacks?

Experiencing frequent port scan alerts can be ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
772 views
0 votes
1 answer

How does Nessus perform vulnerability assessments?

​Nessus, developed by Tenable, is a widely ...READ MORE

Apr 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
600 views
0 votes
1 answer

How to develop a directive that restricts user input based on custom conditions?

To create an Angular directive that restricts ...READ MORE

Apr 10, 2025 in Node-js by anonymous
660 views
0 votes
1 answer

What are the best use cases for AI-powered chatbots in Project Portfolio Management (PPM)?

AI chatbots may be a useful digital ...READ MORE

Apr 8, 2025 in PMP by Naira
722 views