Trending questions in Edureka Community

0 votes
0 answers

How do I set up 2FA with an authentication application (TOTP)?

Time-based One-Time Password (TOTP) authentication adds an ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
506 views
0 votes
0 answers

How do you motivate a team that is experiencing low morale due to project setbacks?

How do you keep a team motivated ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
495 views
0 votes
0 answers

How to enforce SOX compliance for security improvements?

The Sarbanes-Oxley Act (SOX) mandates strict security ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
358 views
0 votes
0 answers

How do I optimize the batch size for a VAE model to achieve faster convergence with balanced accuracy?

With the help of proper code example ...READ MORE

Feb 22, 2025 in Generative AI by Nidhi
• 16,260 points
940 views
0 votes
0 answers

How to create a zero-trust security model using segmentation?

Zero-trust security requires strict access control and ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
357 views
0 votes
2 answers

How can I ensure the data types in Power Query are maintained when moving to the Power BI Data Model?

Ensure data type consistency by explicitly setting ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,307 views
0 votes
0 answers

What’s the risk of weak passwords in network security?

Weak passwords are a major security vulnerability, ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
626 views
0 votes
1 answer

Is there a way to ignore touch events on Text in React Native, or can they be managed differently?

Yes! In React Native, you can ignore ...READ MORE

Feb 22, 2025 in Node-js by Kavya
1,040 views
0 votes
2 answers

How can I open a specific Power BI report directly in the Power BI mobile app, hosted on Power BI Report Server?

Configure the Power BI mobile app with ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,306 views
+1 vote
1 answer

Is there a way to track and visualize variable name changes within a group in Power BI, and what DAX techniques can help?

Tracking and Visualizing Variable Name Changes in ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
704 views
+1 vote
1 answer

Is there an automated way to update Power BI Data Model definitions without manually editing data?

Indeed, models of Power BI data can ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
701 views
0 votes
1 answer

What techniques mitigate catastrophic forgetting in continual Generative AI training?

Techniques like Elastic Weight Consolidation (EWC), Replay ...READ MORE

Mar 17, 2025 in Generative AI by dhoni
744 views
0 votes
1 answer

How can I calculate the year-over-year percentage change using custom fiscal week numbers in Power BI Desktop?

In Power BI, to evaluate the YoY ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
739 views
0 votes
0 answers

Is ethical hacking the same as penetration testing?

Ethical hacking and penetration testing both involve ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
491 views
0 votes
0 answers

What is the Cyber Kill Chain often used to analyze an attacker’s methods?

The Cyber Kill Chain outlines the stages ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
519 views
0 votes
1 answer

Is there a way in Power BI Desktop to transform multiple text column values into a single row, grouped by another column?

Yes, you can transform multiple text values ...READ MORE

Mar 3, 2025 in Power BI by anonymous
• 36,180 points
604 views
0 votes
1 answer

How do I remove a service connection point in Active Directory?

Removing a Service Connection Point (SCP) from ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,525 views
0 votes
0 answers

How would you manage a situation where a risk mitigation plan is not effective?

What would you do if your risk ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
473 views
0 votes
0 answers

Why Does My Node.js MongoDB Query Throw a 'TypeError: Argument Must Be a String' for Custom ObjectID?

Can someone exlpain me with the code ...READ MORE

Mar 6, 2025 in Node-js by Nidhi
• 16,260 points
487 views
0 votes
0 answers

How to prevent session hijacking in a Node.js app?

Session hijacking allows attackers to take over ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
517 views
0 votes
0 answers

How to use Angular services to share data between components?

Explain me with the help of an ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
600 views
0 votes
0 answers

How is enumeration used to gather information about a target?

Enumeration is a process used in cybersecurity ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
743 views
0 votes
0 answers

How to analyze logs for cyber threat detection?

Log files provide valuable insights into system ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
484 views
0 votes
0 answers

How do you perform feature engineering using PolynomialFeatures in Scikit-learn for regression tasks?

With the help of proper code example ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
640 views
0 votes
0 answers

What are common methods of identity theft in networks?

Identity theft occurs when attackers steal personal ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
607 views
0 votes
0 answers

Should the server send secure cookies on an unsecured HTTP response?

Secure cookies are designed to be sent ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
341 views
0 votes
0 answers

Can you reverse engineer malware?

Reverse engineering malware helps in analyzing threats ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
326 views
+1 vote
1 answer

How do I prevent my app from redirecting to Power BI when embedding a protected report in a React application?

To ensure that your React app will ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
680 views
0 votes
0 answers

How do you implement L2 regularization to improve SVM classification performance in Scikit-learn?

Can i know How do you implement ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
631 views
0 votes
1 answer

How to handle duplicate records in MongoDB?

Handling duplicate records in MongoDB depends on ...READ MORE

Feb 23, 2025 in Node-js by Kavya
974 views
0 votes
1 answer

How to pass parameters with react-router?

Passing Parameters with React Router 1. Define a ...READ MORE

Feb 23, 2025 in Node-js by Kavya
946 views
0 votes
0 answers

What are the benefits of ReplaySubject over BehaviorSubject?

I have a doubt about what the ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
504 views
+1 vote
1 answer

How do I set up ADAL authentication for Power BI, and what are the common challenges?

Setting Up ADAL Authentication for Power BI Register ...READ MORE

Feb 28, 2025 in Web Development by anonymous
• 36,180 points
670 views
0 votes
0 answers

How to deny IP ranges with UFW?

Uncomplicated Firewall (UFW) is a user-friendly firewall ...READ MORE

Mar 10, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
313 views
0 votes
0 answers

How do I implement salt into my login for passwords?

Salting enhances password security by adding randomness ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
538 views
0 votes
1 answer

Automating Monthly Sales Data Consolidation from SharePoint

Power Query has been used to automate ...READ MORE

Mar 5, 2025 in Power BI by anonymous
• 36,180 points
499 views
0 votes
0 answers
0 votes
0 answers

Is it possible to block all covert channels?

Covert channels enable hidden data transmission that ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
455 views
0 votes
1 answer

How to read a HttpOnly cookie using JavaScript?

HttpOnly cookies are not to be read ...READ MORE

Dec 31, 2024 in Node-js by Navya
4,010 views
0 votes
1 answer

How do you choose the root node while constructing a decision tree?

Selecting the root node in a decision ...READ MORE

Feb 25, 2025 in Node-js by Navya
839 views
0 votes
2 answers

How can Power BI Fabric integrate with other Microsoft tools (like Excel or Teams) to enhance narrative delivery?

When blended with Microsoft tools like Excel ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6, 2025 899 views
0 votes
0 answers

What strategies do you use to ensure effective communication within your team?

How do you make sure communication in ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
440 views
0 votes
0 answers

What strategies can be used to avoid nonsensical outputs in a language model trained for poetry generation?

Can you tell me What strategies can ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
608 views
0 votes
0 answers

What’s the difference between BehaviorSubject and Subject?

Explain me with the help of an ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
564 views
0 votes
0 answers

How do you diagnose an injector fault?

Explain me with the help of an ...READ MORE

Mar 3, 2025 in Java-Script by Nidhi
• 16,260 points
564 views
0 votes
0 answers

Why would you use a service in Angular and how is it different from a component?

Can you explain with an example that ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
576 views
0 votes
0 answers

How to create currency pipe in Angular?

Can you help me with a code ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
575 views
0 votes
0 answers

How do you address stakeholder dissatisfaction post-project completion?

I'm curious, how do you typically address ...READ MORE

Mar 4, 2025 in PMP by Parshvi
• 7,940 points
500 views
0 votes
0 answers

How would you fix unsatisfactory language generation when fine-tuning a GPT model for business use cases?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
603 views