Trending questions in Edureka Community

0 votes
0 answers

What is threat in cyber security

Hi, My company takes cybersecurity very seriously and ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
914 views
+1 vote
4 answers

Need to wait until page is completely loaded - Selenium WebDriver

You can try something like -  new WebDriverWait(firefoxDriver, ...READ MORE

Dec 21, 2019 in Selenium by Robin
67,265 views
0 votes
0 answers

what does cybersecurity protect?

Sep 4, 2023 in Cyber Security & Ethical Hacking by Rajarshi
• 470 points
897 views
0 votes
0 answers

what does a cyber security analyst do

What are the primary responsibilities and roles ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
897 views
0 votes
0 answers

why is computer security important

What are the key reasons for the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
870 views
0 votes
0 answers

What does %s in a Python format string mean?

For example, in the below code if len(sys.argv) ...READ MORE

Sep 5, 2023 in Python by Satyawrat
• 460 points
952 views
0 votes
1 answer

jQuery get value of select onChange

Try the following lines of code- $('select').on('change', function() ...READ MORE

Feb 11, 2022 in Java by Soham
• 9,730 points
25,562 views
0 votes
0 answers

what is nist cybersecurity framework

What does the NIST (National Institute of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
859 views
0 votes
1 answer

what is C parameter in sklearn Logistic Regression?

C is known as a "hyperparameter." The ...READ MORE

Feb 24, 2022 in Machine Learning by Nandini
• 5,480 points
25,000 views
0 votes
1 answer

ERROR: SQLSTATE[HY000] [2002] No connection could be made because the target machine actively refused it

One of the services has not begun ...READ MORE

Sep 13, 2022 in Database by narikkadan
• 86,360 points
16,349 views
0 votes
0 answers

What is print(f"...") ?

I'm looking at a Python script that ...READ MORE

Sep 18, 2023 in Python by Satyawrat
• 460 points

edited Mar 5, 2025 364 views
0 votes
0 answers

How does super() operate in the presence of multiple inheritance? As an example, consider the following:

class First(object): def __init__(self): ...READ MORE

Sep 6, 2023 in Python by Satyawrat
• 460 points
875 views
0 votes
0 answers

what is attack in information security

What is the concept of an 'attack' ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
832 views
0 votes
1 answer

flutter app not running on ios simulator after adding firebase notification

The error message you provided seems to ...READ MORE

Apr 10, 2023 in Flutter by vishalini
7,267 views
0 votes
0 answers

what is risk in cyber security

Hello, we are in the process of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
813 views
0 votes
0 answers

What is print(f"...")

I'm looking at a Python script that ...READ MORE

Sep 18, 2023 in Python by Satyawrat
• 460 points

edited Mar 5, 2025 330 views
0 votes
0 answers

I need code to count syllables in words, like "hairy" having two syllables. My code works but fails for "HAIRY," which has only one syllable.

def syllable_count(word): count = ...READ MORE

Sep 18, 2023 in Python by Satyawrat
• 460 points

edited Mar 5, 2025 324 views
0 votes
0 answers

what is wireshark in cyber security

What is the role and significance of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
789 views
0 votes
0 answers

what is spear phishing in cyber security

What does the term 'spear phishing' mean ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
784 views
0 votes
0 answers

how criminals plan the attacks in cyber security

Could you provide an in-depth explanation of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
784 views
0 votes
0 answers

how to stop cyber crime

Recently, a member of my family had ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
777 views
0 votes
0 answers

How do I use Python to change YOLO format comments to x1, y1, x2, y2 coordinates?

I want to know how to change ...READ MORE

Sep 16, 2023 in Python by Satyawrat
• 460 points

edited Mar 5, 2025 368 views
0 votes
0 answers

How to sort a dictionary using key?

Example input: {2:3, 1:89, 4:5, 3:0} Desired output: {1:89, 2:3, ...READ MORE

Sep 4, 2023 in Python by Satyawrat
• 460 points
870 views
0 votes
0 answers

what is security in information security

What does the term 'security' signify within ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
757 views
0 votes
0 answers

what is data breach in cyber security

What constitutes a 'data breach' within the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
748 views
0 votes
0 answers

what is cyber security policy

What does the term 'cybersecurity policy' refer ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
748 views
0 votes
0 answers

what is cyber crime and how to prevent it?

"What are the key characteristics and categories ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 373 views
0 votes
0 answers

what is snort in cyber security

What is the significance of 'Snort' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
725 views
0 votes
0 answers

what is cyberspace in cyber security

What constitutes 'cyberspace' within the realm of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
716 views
0 votes
0 answers

what is iso in cyber security?

What role does ISO (International Organization for ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 361 views
0 votes
0 answers

what is threat intelligence in cyber security

What is meant by 'threat intelligence' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
715 views
0 votes
0 answers

why do we need cyber security

I'm now enrolled in a course on ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
713 views
0 votes
0 answers

Is it okay for general applications to use the RuntimeError exception?

raise RuntimeError('config file is missing host address') I've ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
714 views
0 votes
0 answers

How do I learn digital marketing?

Aug 31, 2023 in Digital Marketing by Rajarshi
• 470 points
991 views
0 votes
0 answers

what is reactjs used for?

What are the practical applications and use ...READ MORE

Sep 15, 2023 in Java-Script by Edureka
• 12,730 points

edited Mar 5, 2025 337 views
0 votes
0 answers

what is cyber risk management?

"How does cyber risk management play a ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 338 views
0 votes
0 answers

what does a information security analyst do?

"What are the primary responsibilities and daily ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 331 views
0 votes
0 answers

how to protect cyber security?

How can businesses effectively fortify their cybersecurity ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 327 views
0 votes
0 answers

how to use cyber security?

"How can organizations effectively implement and integrate ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 325 views
0 votes
0 answers

what is cia in cyber security

Hi, According to the OSG, privacy and security ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
670 views
0 votes
0 answers

why is cybercrime increasing?

What are the underlying factors and trends ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 308 views
0 votes
0 answers

how long does it take to learn cyber security?

What factors influence the time it takes ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 298 views
0 votes
0 answers

what is information technology security

What is security in information technology, and ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,730 points

edited Mar 5, 2025 298 views
0 votes
0 answers

what is pmp certification

Sep 4, 2023 in PMP by Saniya
• 3,360 points
636 views
0 votes
0 answers

How to do PMP certification?

What is the step-by-step process for obtaining ...READ MORE

Sep 15, 2023 in PMP by Saniya
• 3,360 points

edited Mar 5, 2025 294 views
0 votes
0 answers

How to become a certified project manager?

What are the specific steps and requirements ...READ MORE

Sep 15, 2023 in PMP by Saniya
• 3,360 points

edited Mar 5, 2025 290 views
+1 vote
3 answers

3 dot in parameter in Java

The "Three Dots" in java is called ...READ MORE

Nov 22, 2018 in Java by geek.erkami
• 2,680 points
59,746 views
0 votes
1 answer

Difference between $(window).load() and $(document).ready() functions

The key difference between $(document). ready() and ...READ MORE

Jun 17, 2022 in JQuery by rajatha
• 7,680 points
19,877 views
0 votes
0 answers

How to get a project management certification?

What are the steps and requirements for ...READ MORE

Sep 13, 2023 in PMP by Saniya
• 3,360 points

edited Mar 5, 2025 316 views
0 votes
0 answers

What do the python file extensions, .pyc .pyd .pyo stand for?

What do these python file extensions mean? .pyc .pyd .pyo What ...READ MORE

Sep 12, 2023 in Python by Rahul
• 240 points

edited Mar 5, 2025 357 views