Trending questions in Edureka Community

0 votes
0 answers
0 votes
0 answers

How do you facilitate effective communication across cross-functional teams?

I'm trying to improve how different teams ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
405 views
0 votes
0 answers

How would you handle a sudden rise in project costs due to market changes?

You planned the budget carefully, but then ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
276 views
0 votes
1 answer

How to use ngIf with else?

You can use *ngIf with else to ...READ MORE

Feb 26 in Node-js by Navya
368 views
0 votes
1 answer

How to preload a component in Angular?

In Angular, components are not preloaded directly, ...READ MORE

Feb 24 in Angular by Navya
444 views
0 votes
0 answers

What’s the impact of network enumeration on cybersecurity?

Network enumeration can be used by both ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
283 views
0 votes
0 answers

How would you proceed if you identify a skills gap too late in a project?

You’re deep into a project, and suddenly ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
272 views
0 votes
0 answers

What are the best practices for access control policies?

Effective access control policies ensure that only ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
270 views
0 votes
1 answer

How can you implement forkJoin for multiple API responses aggregation?

In Angular, forkJoin is used to combine ...READ MORE

Feb 24 in Node-js by Navya
436 views
0 votes
1 answer

What is the best way to trigger change or input event in react js?

To handle change or input events in ...READ MORE

Feb 22 in Node-js by Kavya
556 views
+1 vote
1 answer

What are the recommended ways to transfer data from Power BI to DOMO while maintaining performance and data integrity?

There are approaches to efficiently performing the ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
393 views
0 votes
1 answer

How do I ignore hidden files in Linux?

In Linux, hidden files and directories are ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
575 views
0 votes
0 answers

What is the impact of momentum in Keras optimizers for model convergence?

Can you tell me What is the ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
407 views
0 votes
0 answers

How do you handle team burnout in fast-paced project cycles?

How do you manage team burnout when ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
349 views
0 votes
0 answers

How do you determine key metrics for non-traditional project success?

How do you measure success for projects ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
300 views
+1 vote
1 answer

How can I optimize Power BI performance when working with an SSAS Multidimensional Cube?

Thus, all performance improvements for Power BI ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
385 views
0 votes
1 answer

What methods are available to force a component to re-render when using React hooks?

Here are the primary methods available to ...READ MORE

Feb 23 in Node-js by Kavya
502 views
+1 vote
2 answers

Can you use Power BI Fabric to create dynamic, personalized narratives based on user roles or preferences?

Power BI Fabric makes it possible to ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
414 views
0 votes
0 answers

How do you approach project decisions when ROI is difficult to quantify?

Some projects—especially things like innovation or process ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
254 views
0 votes
0 answers

How does the use of hashed passwords keep data more secure?

Hashing transforms passwords into fixed-length values, making ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
251 views
0 votes
0 answers

What's your approach to managing multiple projects with overlapping deadlines?

How do you manage multiple projects with ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
379 views
0 votes
0 answers

How do I optimize the batch size for a VAE model to achieve faster convergence with balanced accuracy?

With the help of proper code example ...READ MORE

Feb 22 in Generative AI by Nidhi
• 16,260 points
439 views
0 votes
1 answer

How do you implement breadcrumbs in a React-Router app?

Breadcrumbs help users navigate by showing the ...READ MORE

Feb 24 in Node-js by Kavya
452 views
0 votes
1 answer

How would you manage the state between different components of the site?

Method Description Best For Props (Parent to Child) Pass data from ...READ MORE

Feb 24 in Node-js by Kavya
465 views
0 votes
0 answers
0 votes
0 answers

How would you approach the unexpected introduction of a competitor product?

I'm working on a project, and out ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
314 views
0 votes
1 answer

Which of the following method is used for cross-domain Ajax calls?

The correct method used for cross-domain Ajax ...READ MORE

Feb 26 in Angular by Kavya
338 views
0 votes
0 answers

How do you handle communication issues with an international team?

I’m working with an international team, and ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
286 views
0 votes
0 answers

How do you manage knowledge sharing in a diverse, cross-functional team?

When you’re working with people from different ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
242 views
0 votes
0 answers

How do I use Keras to train a Bidirectional LSTM model for sentence classification?

With the help of code can you ...READ MORE

Feb 24 in Generative AI by Vani
• 3,580 points
369 views
0 votes
0 answers

How do you defend against DDoS attacks?

DDoS attacks overload a network or service ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
251 views
0 votes
0 answers

How do you manage critical interdependencies in complex projects?

I’m working on a complex project where ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
283 views
0 votes
0 answers

How do I utilize Keras Callbacks to implement early stopping during model training?

With the help of python programming can ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
385 views
0 votes
0 answers

What’s your approach to handling project setbacks caused by miscommunication?

How do you deal with project delays ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
278 views
0 votes
0 answers

How does OAuth 2.0 manage access in web applications?

OAuth 2.0 is widely used for secure ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
236 views
0 votes
0 answers

How do you handle conflicting stakeholder feedback on deliverables?

I'm currently working on a project where ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
304 views
0 votes
1 answer

Should I use map or switchmap when using angular http module?

When working with the Angular HTTP module, ...READ MORE

Feb 24 in Angular by Navya
406 views
0 votes
1 answer

What’s your approach when a project’s risk increases unexpectedly?

When there are sudden problems in a ...READ MORE

Feb 27 in PMP by Naira
303 views
0 votes
1 answer

How do you integrate authentication with React-Router?

To integrate authentication with React Router, follow ...READ MORE

Feb 24 in Node-js by Kavya
433 views
0 votes
1 answer

What is the default response type of HttpClient service?

By default, HttpClient assumes the server response ...READ MORE

Feb 25 in Node-js by Navya
367 views
0 votes
0 answers

How do I implement a CNN-LSTM hybrid model for video classification tasks?

Can you tell me How do I ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
377 views
0 votes
1 answer

Can we create a custom directive in Angular?

You can create a custom directive in ...READ MORE

Feb 26 in Angular by Tanya
323 views
0 votes
0 answers

What’s your method for quickly evaluating vendor reliability?

How do you quickly figure out if ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
269 views
0 votes
1 answer

How to run a scan equivalent to nmap vulnerabilities scan?

Nmap is a versatile network scanning tool ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
538 views
0 votes
0 answers
0 votes
1 answer

How to set read concern in MongoDB?

In MongoDB, you can set read concern ...READ MORE

Feb 23 in Node-js by Kavya
455 views
+1 vote
1 answer

Why do Power BI visuals created using Python scripts sometimes appear misaligned, and how can this be fixed?

So, while writing a Python script to ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
353 views
0 votes
1 answer

How does BehaviorSubject differ from Subject in state management?

Feature Subject BehaviorSubject Initial Value No initial value Requires an initial value Last ...READ MORE

Feb 24 in Node-js by Navya
395 views
0 votes
0 answers

How do you keep the team focused if they lack interest in the project topic?

I've been in situations where the team ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
352 views
0 votes
1 answer

How do you design a data model for a social media platform using MongoDB?

Design a MongoDB data model for a ...READ MORE

Feb 23 in Node-js by Kavya
453 views