Trending questions in Edureka Community

0 votes
2 answers

What steps would you take to optimize a Power BI Desktop connection to a large data warehouse?

Optimize Power BI’s connection to a large ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 24,450 points
860 views
0 votes
0 answers

What role does hyperparameter search play in optimizing Generative AI pipelines?

With the help of proper code example ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
490 views
0 votes
1 answer

Why don't digital signatures reveal the sender’s private key?

Digital signatures are a cornerstone of modern ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
599 views
0 votes
1 answer

What are the negative aspects of creating fake security footprints?

Creating fake security footprints, such as misleading ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
537 views
0 votes
0 answers

How does zero-shot inference improve Generative AI for unseen tasks?

With the help of code can you ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
477 views
0 votes
0 answers

What are the challenges in embedding large contexts in Generative AI for summarization tasks?

Can you tell me What the challenges ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
473 views
0 votes
1 answer

How is the digital certificate sent alongside digital signatures?

When a digital signature is applied to ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
580 views
0 votes
0 answers

How can federated learning be used to train Generative AI across distributed datasets?

With the help of code can you ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
488 views
0 votes
0 answers

How do I set up CI/CD pipelines specifically for Generative AI model development?

With the help of code examples, can ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
462 views
0 votes
0 answers
0 votes
0 answers

How does regularization scaling impact Generative AI for hierarchical task optimization?

With the help of proper code examples, ...READ MORE

Feb 12, 2025 in Generative AI by Ashutosh
• 33,350 points
415 views
0 votes
0 answers

testing question for logout case, please dont approve it

testing question for logout case, please dont ...READ MORE

Feb 11, 2025 in Career Counselling by anonymous

edited Mar 5, 2025 488 views
0 votes
1 answer

How to check if your phone is under surveillance?

If you think your phone might be ...READ MORE

Nov 25, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
3,815 views
0 votes
0 answers

How to improve word output for hugging face models?

With the help of code, can you ...READ MORE

Feb 14, 2025 in Generative AI by Ashutosh
• 33,350 points
356 views
0 votes
0 answers

How do time decay models benefit Generative AI for real-time updates?

Can you tell me how time decay ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
437 views
0 votes
0 answers

How can I use LoRA or quantization techniques to reduce model size without significant accuracy loss?

With the help of code can you ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
526 views
0 votes
1 answer

How do you implement data parallelism in model training for resource-constrained environments?

In order to implement data parallelism in resource-constrained ...READ MORE

Nov 13, 2024 in Generative AI by Ashutosh
• 33,350 points
4,324 views
0 votes
1 answer

What is the best practice for renaming a branch in Azure DevOps while ensuring minimal disruption?

The Best Methods for Azure DevOps Branch ...READ MORE

Dec 5, 2024 in DevOps Tools by Gagana
• 10,070 points
3,358 views
0 votes
0 answers

How do I identify and mitigate model hallucinations in domain-specific generative applications?

Can you tell me How do I ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
441 views
0 votes
1 answer

How to exploit LDAP injection?

LDAP injection is a security vulnerability that ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
445 views
0 votes
0 answers

Are comments obsolete in favor of Generative AI?

Can you tell me if comments are ...READ MORE

Feb 14, 2025 in Generative AI by Ashutosh
• 33,350 points
335 views
0 votes
1 answer

Why do digital signatures need different algorithms?

Digital signatures are essential in modern cryptography ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
526 views
0 votes
1 answer

Any reason I shouldn't be salting and hashing before putting through bCrypt?

When implementing password security with bcrypt, it's ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
542 views
0 votes
1 answer

How secure is the hashing, salting, and stretching process in this diagram?

Evaluating the security of your password hashing, ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
513 views
0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
519 views
+1 vote
2 answers

How do I register for a certification test for the pl 300?

These are the steps that can be ...READ MORE

Oct 25, 2024 in Power BI by pooja
• 24,450 points
4,163 views
0 votes
1 answer

Error - could not install packages due to an oserror - [errno 2] no such file or directory

I also met with the same problem ...READ MORE

Apr 28, 2022 in Python by narikkadan
• 86,360 points
44,494 views
0 votes
2 answers

Can I use a single access token for multiple Power BI Embedded reports?

Yes, you can use a single access ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 36,180 points
729 views
0 votes
1 answer

Is salting a hash more secure than encrypting it?

When securing passwords, it's essential to understand ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
474 views
0 votes
1 answer

Would re-salting passwords regularly in-/decrease security?

Regularly re-salting and re-hashing stored passwords—changing the ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
470 views
+1 vote
1 answer

How do you handle many-to-many relationships in Power Pivot when designing a data model to ensure correct data aggregation?

Handling the many-to-many relationships is really intelligent ...READ MORE

Dec 2, 2024 in Power BI by pooja
• 24,450 points
1,307 views
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
535 views
+1 vote
1 answer

What is the difference between Power Pivot's Data Model and Power BI’s data model, and how can they be integrated effectively?

Power Pivot Data Model compared with Power ...READ MORE

Dec 2, 2024 in Power BI by pooja
• 24,450 points
1,290 views
+1 vote
2 answers
0 votes
1 answer

Why is Nmap not showing open ports?

When Nmap fails to detect open ports ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,823 views
+1 vote
1 answer

How can you use Power Pivot in Excel to create a star schema model and integrate it with Power BI for reporting?

How Power Pivot gives optimal data models: ...READ MORE

Dec 2, 2024 in Power BI by pooja
• 24,450 points
1,242 views
0 votes
1 answer

Why is my Power BI matrix/table visual displaying duplicate rows or incorrect totals?

Cause of duplicate rows or wrong totals ...READ MORE

Dec 30, 2024 in Power BI by Anu
• 3,020 points

edited Mar 6, 2025 3,127 views
0 votes
1 answer

How to generate optimized source with and without sourcemap for production use?

To generate optimized source code with or ...READ MORE

Dec 31, 2024 in PHP by Navya
2,078 views
0 votes
0 answers

Why does Google Vertex AI throw timeout errors during large batch inference jobs?

With the help of code example tell ...READ MORE

Jan 22, 2025 in Generative AI by Nidhi
• 16,260 points
985 views
+1 vote
1 answer
0 votes
1 answer

How to add popper.js in React?

Install Popper.js via npm (npm install @popperjs/core), ...READ MORE

Feb 23, 2025 in Node-js by Kavya
1,077 views
+1 vote
1 answer
0 votes
1 answer

How can I check if a private key and certificate match in OpenSSL with ECDSA?

To check if a private key matches ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
3,141 views
+1 vote
1 answer

How do you optimize Power Pivot models to handle millions of rows of transactional data without degrading performance?

Capacity Modeling: Power Pivot models that process ...READ MORE

Dec 12, 2024 in Power BI by pooja
• 24,450 points
900 views
0 votes
1 answer

Why does Git keep asking for my password when using Azure DevOps, and how can I fix it?

Reason: When authentication isn't set up correctly or ...READ MORE

Dec 6, 2024 in DevOps Tools by Gagana
• 10,070 points
3,032 views
+1 vote
2 answers
0 votes
1 answer

How can I assign a variable to hold a multiline string in JavaScript?

You can assign a variable to hold ...READ MORE

Feb 7, 2025 in Java-Script by Navya
898 views