Trending questions in Edureka Community

0 votes
0 answers

What strategies do you use to ensure effective communication within your team?

How do you make sure communication in ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
154 views
0 votes
0 answers

How do I set up 2FA with an authentication application (TOTP)?

Time-based One-Time Password (TOTP) authentication adds an ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
160 views
0 votes
0 answers

How do you handle cultural differences within an international project team?

How do you deal with cultural differences ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
149 views
0 votes
0 answers

Describe a situation where you had to resolve a conflict between team members. What was your approach?

Can you share a time when you ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
149 views
0 votes
0 answers

What is the difference between debounceTime and debounce?

Can you tell me what the difference ...READ MORE

Mar 5 in Angular by Nidhi
• 16,140 points
199 views
0 votes
0 answers

How does takeUntil() help in cleaning up Observables?

i want know with the help of ...READ MORE

Mar 5 in Angular by Nidhi
• 16,140 points
195 views
0 votes
0 answers

What steps would you take if a key team member unexpectedly leaves the project?

What would you do if an important ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
144 views
0 votes
0 answers

How do you motivate a team that is experiencing low morale due to project setbacks?

How do you keep a team motivated ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
144 views
0 votes
0 answers

Which Nmap flag is used for performing a default script scanning?

Nmap provides various flags for scanning networks ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
196 views
0 votes
1 answer

Creating a Dynamic Table for the Top 5 Selling Products per Region

As data on what to update was ...READ MORE

Mar 5 in Power BI by anonymous
• 33,070 points
193 views
0 votes
0 answers

How do you apply transform functions in PipeTransform Interface?

i want know with the help of ...READ MORE

Mar 5 in Angular by Nidhi
• 16,140 points
191 views
+1 vote
2 answers

Why does the scrollbar theme change between Power BI Desktop and Web? Can it be standardized?

This discrepancy in scroll bar themes between ...READ MORE

Jan 8 in Power BI by pooja
• 24,450 points
251 views
0 votes
0 answers

Describe your approach to managing a remote project team.

What’s your strategy for managing a remote ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
132 views
0 votes
0 answers

How do you handle a major shift in project goals due to market changes?

If a major shift in the market ...READ MORE

Mar 4 in PMP by Parshvi
• 7,940 points
202 views
0 votes
1 answer

How to lock cells in excel ?

To make a column non-editable: Select the whole ...READ MORE

Oct 18, 2022 in Others by narikkadan
• 86,360 points
37,750 views
0 votes
0 answers

Describe a time when you had to lead a team through a significant change. How did you manage it?

What steps do you take to manage ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
131 views
0 votes
0 answers

How do you ensure projects align with evolving industry standards?

With industries always changing, how do you ...READ MORE

Mar 4 in PMP by Parshvi
• 7,940 points
201 views
0 votes
0 answers

Is it possible to block all covert channels?

Covert channels enable hidden data transmission that ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
146 views
0 votes
0 answers

How to analyze logs for cyber threat detection?

Log files provide valuable insights into system ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
146 views
0 votes
0 answers

How would you manage a team member who is consistently underperforming?

How would you handle a team member ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
134 views
0 votes
0 answers

How to prevent session hijacking in a Node.js app?

Session hijacking allows attackers to take over ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
171 views
0 votes
0 answers

How do you quickly deploy a honeypot with Kali Linux?

A honeypot is a security mechanism designed ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
170 views
0 votes
1 answer

Comparing Year-to-Date (YTD) vs. Previous Year YTD in a Financial Dashboard

The approach to creating such a comparison ...READ MORE

Mar 5 in Power BI by anonymous
• 33,070 points
182 views
0 votes
0 answers

How to prevent SQL injection attacks in Python?

SQL injection is a critical security threat ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
219 views
0 votes
0 answers

Describe a time when you failed to identify a critical risk. How did you handle the situation?

Have you ever missed a major risk ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
123 views
0 votes
0 answers

What is the best way to share services across Modules in angular2?

i want know with the help of ...READ MORE

Mar 5 in Angular by Nidhi
• 16,140 points
178 views
0 votes
0 answers

How do you approach risk identification during the planning phase?

What's your process for spotting potential risks ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
127 views
0 votes
1 answer

Removing Duplicate Transactions While Keeping the Latest Entry

An approach to eliminate duplicate transactions while ...READ MORE

Mar 5 in Power BI by anonymous
• 33,070 points
177 views
0 votes
0 answers

How do you handle a situation where a team member disagrees with your project decisions?

How do you go about assessing risks ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
121 views
0 votes
0 answers

Can we use async pipe instead of manually subscribing?

With the help of an example, can ...READ MORE

Mar 5 in Angular by Nidhi
• 16,140 points
177 views
0 votes
1 answer

How can I extract a list of used and unused measures and columns from Power BI project folders using Python?

The extracted measures and columns, which represent ...READ MORE

Feb 28 in Power BI by anonymous
• 33,070 points
382 views
0 votes
0 answers

How to implement role-based access control (RBAC) in Java?

Role-Based Access Control (RBAC) restricts system access ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
212 views
0 votes
0 answers

How to detect log-based anomalies using Python?

Analyzing logs can help detect unusual activity ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
161 views
0 votes
0 answers

How would you handle a situation where an identified risk becomes a reality?

If a risk you planned for actually ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
115 views
0 votes
0 answers

Is ethical hacking the same as penetration testing?

Ethical hacking and penetration testing both involve ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
128 views
0 votes
1 answer

Categorizing Employees Based on Sales Performance

In this classification, one should employ a ...READ MORE

Mar 5 in Power BI by anonymous
• 33,070 points
169 views
+1 vote
2 answers

How can I create additive slicers in Power BI that recognize unique cell contents?

Build Additive Slicers in Power BI: Slices ...READ MORE

Jan 8 in Power BI by pooja
• 24,450 points
227 views
0 votes
0 answers

How would you manage a situation where a risk mitigation plan is not effective?

What would you do if your risk ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
111 views
0 votes
0 answers

How to implement XSS protection in a Node.js app?

Cross-Site Scripting (XSS) is a common web ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
168 views
0 votes
0 answers

Agile vs. Lean – which is better for continuous improvement?

When it comes to continuous improvement, which ...READ MORE

Mar 4 in PMP by Parshvi
• 7,940 points
179 views
+1 vote
2 answers

Is there an alternative short name for Power Query Formula Language (M) besides "M"?

Power Query Formula Language can be stated ...READ MORE

Jan 8 in Power BI by pooja
• 24,450 points
226 views
0 votes
1 answer

How to Calculate Total Sales for the Last 3 Months Dynamically in DAX?

To dynamically calculate total sales for the ...READ MORE

Mar 3 in Power BI by anonymous
• 33,070 points
238 views
0 votes
0 answers

How to enforce PCI DSS compliance in web applications?

PCI DSS sets security standards for handling ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
150 views
0 votes
0 answers

How would you handle a situation where key project stakeholders have conflicting objectives?

What would you do if key stakeholders ...READ MORE

Mar 4 in PMP by Parshvi
• 7,940 points
175 views
0 votes
0 answers

How do you prioritize risks in a project with multiple high-impact potential issues?

If a project has multiple high-impact risks, ...READ MORE

Mar 7 in PMP by Parshvi
• 7,940 points
104 views
0 votes
0 answers

What are the benefits of ReplaySubject over BehaviorSubject?

I have a doubt about what the ...READ MORE

Mar 5 in Angular by Nidhi
• 16,140 points
159 views
0 votes
0 answers

How do you address stakeholder dissatisfaction post-project completion?

I'm curious, how do you typically address ...READ MORE

Mar 4 in PMP by Parshvi
• 7,940 points
171 views
0 votes
1 answer

Automating Monthly Sales Data Consolidation from SharePoint

Power Query has been used to automate ...READ MORE

Mar 5 in Power BI by anonymous
• 33,070 points
155 views
0 votes
0 answers

When to use switchMap vs concatMap?

With the help of an example, can ...READ MORE

Mar 3 in Angular by Nidhi
• 16,140 points
223 views
0 votes
0 answers

What are the legal regulations for data protection in networks?

Data protection laws ensure privacy and security ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
187 views