Trending questions in Edureka Community

0 votes
1 answer

What’s the safest way to store 2FA/MFA secret keys in a database?

​Storing Two-Factor Authentication (2FA) or Multi-Factor Authentication ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
758 views
0 votes
1 answer

What are the implications of incomplete retrospectives on team performance?

Retrospectives are an important Agile ceremony that ...READ MORE

Apr 15 in PMP by Naira
228 views
0 votes
0 answers

Write a Python script to implement a byte pair encoding (BPE) tokenizer from scratch.

With the help of code can i ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
221 views
0 votes
1 answer

Can you explain three-point estimation with real examples in IT projects?

Three-point estimation is a strategy for estimating ...READ MORE

Apr 15 in PMP by Naira
234 views
0 votes
1 answer

How can you embed Agile KPIs into a project dashboard?

Adding Agile Key Performance Indicators (KPIs) to ...READ MORE

Apr 15 in PMP by Naira
227 views
0 votes
1 answer

How can attackers exploit IPsec security associations?

​IPsec Security Associations (SAs) are fundamental to ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
235 views
0 votes
1 answer

What strategies can you implement for resolving embedding mismatches in LLamaIndex?

You can resolve embedding mismatches in LlamaIndex ...READ MORE

Apr 21 in Generative AI by nimona
231 views
0 votes
1 answer

How do firewalls detect and block scanning attempts?

​Firewalls play a crucial role in network ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
405 views
0 votes
0 answers

Implement a Python script to connect an LLM with a FAISS-based vector store.

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
217 views
0 votes
0 answers

How to Implement a flash attention module for a Transformer model in PyTorch.

May i know How to Implement a ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
217 views
0 votes
1 answer

How does Honeypot analysis help detect scanners?

​Honeypots are decoy systems designed to mimic ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
403 views
0 votes
1 answer

How do you perform S-Curve analysis for project financial performance?

The S-curve analysis measures cumulative cost, effort, ...READ MORE

Apr 14 in PMP by Naira
269 views
0 votes
1 answer

How to implement a directive that auto-saves form data periodically?

To create a directive that automatically saves ...READ MORE

Apr 10 in Node-js by anonymous
463 views
0 votes
1 answer

How do AI-powered scanners compare with traditional tools?

​AI-powered vulnerability scanners represent a significant advancement ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
402 views
0 votes
1 answer

What are real-time monitoring tools for vulnerability detection?

Real-time vulnerability detection tools are essential for ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
273 views
0 votes
0 answers

Develop a generative AI system that reviews Python code and suggests optimizations.

Can you tell me Develop a generative ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
209 views
0 votes
1 answer

How can spoofing attacks be prevented?

​Spoofing attacks involve impersonating trusted entities to ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
267 views
0 votes
1 answer

Do firewalls protect against port scanning?

​Yes, firewalls can detect and block port ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
239 views
0 votes
1 answer

How do you use baseline variance analysis in Oracle Primavera to manage project delays?

Primavera P6 excels at baseline management. Variance ...READ MORE

Apr 8 in PMP by Naira
542 views
0 votes
1 answer

How to prepare a VAPT report?

​A Vulnerability Assessment and Penetration Testing (VAPT) ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
393 views
0 votes
0 answers
0 votes
0 answers

What are the best practices for deploying TPU-trained models to production systems?

Can you explian to me What are ...READ MORE

Apr 8 in Generative AI by Ashutosh
• 33,350 points
555 views
0 votes
1 answer

How does AI improve vulnerability detection?

​Artificial Intelligence (AI) significantly enhances vulnerability detection ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
428 views
0 votes
0 answers

How would you prevent unauthorized prompt injections in an API-based LLM service?

With the help of proper code example ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
208 views
0 votes
1 answer

How to build a directive that listens for specific keyboard shortcuts?

You can use the @HostListener decorator to ...READ MORE

Apr 10 in Angular by anonymous
419 views
0 votes
0 answers

Write a Python server that streams LLM responses using WebSockets.

Can you Write a Python server that ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
194 views
0 votes
0 answers

How do I generate real-time dashboards in Monday.com for stakeholder reporting?

I’m trying to build real-time dashboards in ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
262 views
0 votes
1 answer

How to develop a pipe that formats phone numbers based on locale?

You can use the libphonenumber-js library for ...READ MORE

Apr 10 in Angular by anonymous
408 views
0 votes
1 answer

How to create a structural directive that renders elements based on user permissions?

Here's how to create a structural directive ...READ MORE

Apr 10 in Node-js by anonymous
432 views
0 votes
0 answers

How would you convert unstructured text data into a structured format for LLM fine-tuning?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
229 views
0 votes
1 answer

Create a function for custom parameter initialization in QLoRA fine-tuning.

You can create a custom parameter initialization ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
383 views
0 votes
1 answer

How do you set up webhooks in Asana for automated task updates?

Asana webhooks for automation allow Agile teams ...READ MORE

Apr 8 in PMP by Naira
486 views
0 votes
0 answers

Modify a Hugging Face generate() function to improve real-time token streaming speed.

Can i know Modify a Hugging Face ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
172 views
0 votes
1 answer

What’s the best way to visualize cumulative flow diagrams (CFD) in ClickUp Dashboards?

ClickUp enables showing Agile data, although Cumulative ...READ MORE

Apr 8 in PMP by Naira
504 views
0 votes
1 answer

How to use host bindings to bind properties to the host element in a component?

In Angular (2+), the @HostBinding() decorator allows ...READ MORE

Apr 10 in Node-js by anonymous
420 views
0 votes
0 answers

How can reinforcement learning be used to enforce ethical constraints on an AI chatbot?

Can you tell me How can reinforcement ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
170 views
0 votes
0 answers

How to implement speculative decoding for a multi-turn chatbot using a small draft model.

Can you tell me How to implement ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
215 views
0 votes
1 answer

Write a script to log validation perplexity during QLoRA training.

You can log validation perplexity during QLoRA ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
372 views
0 votes
1 answer

What’s the best way to use REST APIs for syncing data between Jira and SAP ERP?

Jira-SAP ERP integration enhances the alignment between ...READ MORE

Apr 8 in PMP by Naira

reshown Apr 8 by Neelam 475 views
0 votes
1 answer

How to implement adapter fusion in QLoRA for multi-task learning?

You can implement adapter fusion in QLoRA ...READ MORE

Apr 15 in Generative AI by nidhi
343 views
0 votes
0 answers

In a chatbot system, how can KV caching be optimized to reduce redundant computations?

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
211 views
0 votes
1 answer

How do attackers bypass SNMP security restrictions?

​Attackers can bypass SNMP (Simple Network Management ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
225 views
0 votes
1 answer

How to dynamically inject components into the DOM using @Component?

You need to use ComponentFactoryResolver and ViewContainerRef. ...READ MORE

Apr 10 in Node-js by anonymous
413 views
0 votes
1 answer

How to build a directive that conditionally adds elements to the DOM based on API responses?

Structural Directive with API Condition 1. Create the ...READ MORE

Apr 10 in HTML by anonymous
385 views
0 votes
0 answers

How would you align token embeddings across two different LLMs for cross-model compatibility?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
206 views
0 votes
0 answers

How would you distill a 7B model into a 1.5B model while retaining key capabilities?

May i know How would you distill ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
171 views
0 votes
0 answers

How can you ensure that sensitive data isn’t leaked in a RAG-based chatbot?

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
168 views
0 votes
0 answers

How can I schedule automated data refresh with notification alerts?

How can I schedule automated data refresh ...READ MORE

Apr 16 in Power BI by pooja
• 24,450 points
152 views
0 votes
1 answer

What’s the best way to use automated speech-to-text meeting minutes in Otter.ai for Agile teams?

Using Otter.ai for Agile teams may greatly ...READ MORE

Apr 8 in PMP by Naira

reshown Apr 8 by Neelam 461 views