Trending questions in Edureka Community

0 votes
0 answers

Is it possible to block all covert channels?

Covert channels enable hidden data transmission that ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
414 views
0 votes
0 answers
0 votes
0 answers

What strategies do you use to ensure effective communication within your team?

How do you make sure communication in ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
402 views
0 votes
1 answer

What are the steps to create and customize a Waterfall chart in Power BI?

A Waterfall chart in Power BI is useful for ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
655 views
0 votes
0 answers

What are the benefits of ReplaySubject over BehaviorSubject?

I have a doubt about what the ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
450 views
0 votes
1 answer

How to Calculate Dynamic Regional Sales Percentage in DAX?

To compute the percentage of total sales ...READ MORE

Mar 3, 2025 in Power BI by anonymous
• 36,180 points
522 views
+1 vote
1 answer

Is there a way to track and visualize variable name changes within a group in Power BI, and what DAX techniques can help?

Tracking and Visualizing Variable Name Changes in ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
614 views
0 votes
1 answer

How can I calculate the year-over-year percentage change using custom fiscal week numbers in Power BI Desktop?

In Power BI, to evaluate the YoY ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
653 views
0 votes
1 answer

Automating Monthly Sales Data Consolidation from SharePoint

Power Query has been used to automate ...READ MORE

Mar 5, 2025 in Power BI by anonymous
• 36,180 points
443 views
0 votes
1 answer

Categorizing Employees Based on Sales Performance

In this classification, one should employ a ...READ MORE

Mar 5, 2025 in Power BI by anonymous
• 36,180 points
443 views
0 votes
0 answers

How do you implement L2 regularization to improve SVM classification performance in Scikit-learn?

Can i know How do you implement ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
562 views
0 votes
0 answers

How to use Angular services to share data between components?

Explain me with the help of an ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
514 views
+1 vote
1 answer

Is there an automated way to update Power BI Data Model definitions without manually editing data?

Indeed, models of Power BI data can ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
606 views
+1 vote
1 answer

How do I set up ADAL authentication for Power BI, and what are the common challenges?

Setting Up ADAL Authentication for Power BI Register ...READ MORE

Feb 28, 2025 in Web Development by anonymous
• 36,180 points
606 views
0 votes
0 answers

How do you address stakeholder dissatisfaction post-project completion?

I'm curious, how do you typically address ...READ MORE

Mar 4, 2025 in PMP by Parshvi
• 7,940 points
452 views
0 votes
0 answers

What strategies can be used to avoid nonsensical outputs in a language model trained for poetry generation?

Can you tell me What strategies can ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
555 views
+1 vote
1 answer

What are the correct steps to set up Power BI with Amazon Redshift using an ODBC driver?

To integrate Power BI with Amazon Redshift ...READ MORE

Feb 27, 2025 in Power BI by anonymous
• 36,180 points
704 views
0 votes
0 answers

How would you fix unsatisfactory language generation when fine-tuning a GPT model for business use cases?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
551 views
0 votes
0 answers

How do you diagnose an injector fault?

Explain me with the help of an ...READ MORE

Mar 3, 2025 in Java-Script by Nidhi
• 16,260 points
507 views
0 votes
0 answers

How do I implement salt into my login for passwords?

Salting enhances password security by adding randomness ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
472 views
0 votes
2 answers

How can Power BI Fabric integrate with other Microsoft tools (like Excel or Teams) to enhance narrative delivery?

When blended with Microsoft tools like Excel ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6, 2025 840 views
0 votes
0 answers

What are the legal regulations for data protection in networks?

Data protection laws ensure privacy and security ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
470 views
0 votes
0 answers

What can you do to improve output fluency when generating text summaries with a language model?

Can i know What can you do ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
549 views
0 votes
1 answer

How can numbers be formatted with leading zeros in JavaScript?

You can format numbers with leading zeros ...READ MORE

Feb 21, 2025 in Java-Script by Kavya
1,138 views
0 votes
0 answers

How do you prioritize risks in a project with multiple high-impact potential issues?

If a project has multiple high-impact risks, ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
373 views
0 votes
0 answers

Describe a time when you had to lead a team through a significant change. How did you manage it?

What steps do you take to manage ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
372 views
+1 vote
1 answer
0 votes
0 answers

Can cybersecurity be automated by AI?

AI is increasingly being integrated into cybersecurity ...READ MORE

Mar 5, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
424 views
0 votes
1 answer

Why are initial states undefined in React Native, or what causes this behavior?

In React Native (or React in general), ...READ MORE

Feb 23, 2025 in Node-js by Kavya
878 views
0 votes
0 answers

How to detect log-based anomalies using Python?

Analyzing logs can help detect unusual activity ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
409 views
0 votes
0 answers

Why would you use a service in Angular and how is it different from a component?

Can you explain with an example that ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
506 views
0 votes
0 answers

Describe a time when you failed to identify a critical risk. How did you handle the situation?

Have you ever missed a major risk ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
363 views
0 votes
0 answers

What’s the difference between BehaviorSubject and Subject?

Explain me with the help of an ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
492 views
0 votes
0 answers

How do you deal with errors in Observables?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
491 views
0 votes
0 answers

When should we use providedIn: ‘root’ vs ‘module’ for services?

I was hoping you could explain to ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
491 views
0 votes
2 answers
0 votes
0 answers

How do you approach risk identification during the planning phase?

What's your process for spotting potential risks ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
366 views
0 votes
0 answers

How to create currency pipe in Angular?

Can you help me with a code ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
503 views
0 votes
0 answers

How do I optimize the batch size for a VAE model to achieve faster convergence with balanced accuracy?

With the help of proper code example ...READ MORE

Feb 22, 2025 in Generative AI by Nidhi
• 16,260 points
812 views
0 votes
0 answers

How do you quickly deploy a honeypot with Kali Linux?

A honeypot is a security mechanism designed ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
402 views
0 votes
0 answers

Why do we need to unsubscribe from observable?

Can you explain to me with an ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
414 views
0 votes
1 answer

What techniques mitigate catastrophic forgetting in continual Generative AI training?

Techniques like Elastic Weight Consolidation (EWC), Replay ...READ MORE

Mar 17, 2025 in Generative AI by dhoni
624 views
0 votes
0 answers

What ways can be used to protect from credential stuffing and automated attacks?

Credential stuffing and automated attacks exploit reused ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
451 views
0 votes
0 answers

Describe your approach to managing a remote project team.

What’s your strategy for managing a remote ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
355 views
0 votes
0 answers

How do Identity and Access Management (IAM) systems work?

Identity and Access Management (IAM) systems control ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
500 views
+1 vote
1 answer

How do I prevent my app from redirecting to Power BI when embedding a protected report in a React application?

To ensure that your React app will ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
578 views
0 votes
0 answers

What’s your approach to meeting a sudden reduction in project timeline?

If the project timeline gets cut short ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
441 views
0 votes
0 answers

How do you create a reusable component in Angular?

Can you explain with an example that ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
494 views
0 votes
0 answers
0 votes
0 answers

How do you manage differing levels of project experience within a team?

I’m wondering how to manage a team ...READ MORE

Mar 4, 2025 in PMP by Parshvi
• 7,940 points
418 views