Trending questions in Edureka Community

0 votes
0 answers

What are some common risk management mistakes project managers make?

What are some common risk management mistakes ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
314 views
0 votes
1 answer

How to trigger an Observable in Angular 2 on local storage change?

In Angular 2+, you can trigger an ...READ MORE

Mar 11 in Node-js by Tanmay
527 views
0 votes
0 answers

How to implement a dropdown menu within a Bootstrap 3 navigation bar?

Can you tell me How to implement ...READ MORE

Mar 19 in Java-Script by Ashutosh
• 33,350 points
215 views
0 votes
0 answers

How to simulate a MITM attack using Scapy in Python?

Scapy is a powerful Python library used ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
792 views
0 votes
0 answers

What’s the best way to manage vendor costs in a project?

What’s the best way to keep vendor ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
266 views
0 votes
0 answers
0 votes
0 answers

How do you communicate risks to stakeholders effectively?

How do you communicate risks to stakeholders ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
297 views
0 votes
1 answer

__init__() got an unexpected keyword argument 'gpus'

This error typically happens when using PyTorch ...READ MORE

Mar 11 in Generative AI by nidhi
516 views
0 votes
0 answers
0 votes
1 answer

How to manipulate encoder state in a multi-layer bidirectional with Attention Mechanism

Manipulating the encoder state in a multi-layer ...READ MORE

Mar 17 in Generative AI by Nikhil
248 views
0 votes
0 answers

How do you ensure alignment between project goals and business objectives?

How do you make sure a project’s ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
290 views
0 votes
1 answer

What’s the best way to handle slow row-level security (RLS) filters applied to large datasets?

The implementation of Row-Level Security (RLS) on ...READ MORE

Mar 11 in Power BI by anonymous
• 36,180 points
497 views
0 votes
1 answer

How to integrate Attention mechanism to training process with Sentence Transformers?

To integrate an attention mechanism into the ...READ MORE

Mar 17 in Generative AI by mehek
349 views
0 votes
0 answers

What is an example of an IoT botnet attack scenario?

IoT botnets leverage compromised devices to launch ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
196 views
0 votes
0 answers

How to use generator functions in redux-saga for retry logic?

With the help of code can you ...READ MORE

Mar 19 in Node-js by Ashutosh
• 33,350 points
200 views
0 votes
0 answers

How to write an action creator that handles errors in an async API call?

Can you explain to me How to ...READ MORE

Mar 19 in Node-js by Ashutosh
• 33,350 points
196 views
0 votes
0 answers

What strategies do you use to build trust with project stakeholders?

How do you build and maintain trust ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
268 views
0 votes
1 answer

adding attention mechanism to yolo algorithm

To add an attention mechanism to the ...READ MORE

Mar 17 in Generative AI by megha
342 views
0 votes
0 answers

What is the difference between NIST and NIST 800-53?

NIST provides cybersecurity standards and frameworks, including ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
185 views
0 votes
1 answer

Is there a way to load a saved SKLearn VectorStore using langchain?

Yes, a saved SKLearn VectorStore can be ...READ MORE

Mar 17 in Generative AI by bitlaniaya
345 views
0 votes
0 answers

How do you integrate project management tools with existing workflows?

I want to start using project management ...READ MORE

Mar 19 in PMP by Parshvi
• 7,940 points
178 views
0 votes
0 answers

How to create an action creator that dispatches multiple actions during an async operation?

With the help of programming can you ...READ MORE

Mar 19 in Node-js by Ashutosh
• 33,350 points
188 views
0 votes
0 answers

What is Artificial Intelligence ?

What is Artificial Intelligence ? and what ...READ MORE

Mar 20 in Generative AI by Rajeswri
• 140 points
145 views
0 votes
0 answers

Can a password cracker reverse engineer my generation method?

Password crackers use various techniques to break ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
183 views
0 votes
0 answers

Which OWASP Top 10 IoT vulnerability category deals with poorly protected passwords?

The OWASP IoT Top 10 highlights key ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
183 views
0 votes
0 answers

How do you manage a project where stakeholders have conflicting priorities?

How do you handle situations where different ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
260 views
0 votes
0 answers

What are the biggest challenges in initiating a new project?

What are some of the biggest challenges ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
271 views
0 votes
0 answers

What factors do you consider when selecting a project methodology (Agile, Waterfall, etc.)?

What factors help you decide whether to ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
271 views
0 votes
0 answers

How to handle HTTP GET requests in Angular using HttpClient?

Can you explain with the help of ...READ MORE

Mar 19 in Node-js by Ashutosh
• 33,350 points
174 views
0 votes
1 answer

How does the transformer model's attention mechanism deal with differing sequence lengths?

The Transformer model's attention mechanism handles differing ...READ MORE

Mar 17 in Generative AI by Ashutosh
• 33,350 points
226 views
0 votes
1 answer

How can I resolve issues with calling the Gemini API in an Electron.js application?

To use secure server-side proxy calls to ...READ MORE

Mar 12 in Generative AI by amrita
461 views
0 votes
1 answer

Add attention mechanism to classification problem

Adding an attention mechanism to a classification ...READ MORE

Mar 17 in Generative AI by dopi
334 views
0 votes
0 answers

What are the best reporting tools for project tracking?

Keeping track of project progress is crucial, ...READ MORE

Mar 19 in PMP by Parshvi
• 7,940 points
168 views
0 votes
0 answers

How do you estimate project timelines accurately?

How do you estimate project timelines accurately ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
260 views
+1 vote
1 answer
0 votes
1 answer

what's the difference between "self-attention mechanism" and "full-connection" layer?

A self-attention mechanism computes contextual relationships between ...READ MORE

Mar 17 in Generative AI by batauski
319 views
0 votes
0 answers

How can IoT threat modeling prevent cyber attacks?

Threat modeling helps identify and mitigate security ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
166 views
0 votes
0 answers

How to manage async API calls in a React app using redux-thunk?

Can you tell me How to manage ...READ MORE

Mar 19 in Node-js by Ashutosh
• 33,350 points
169 views
0 votes
0 answers

How do you keep stakeholders informed without overwhelming them with details?

How do you keep stakeholders updated without ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
241 views
+1 vote
2 answers

Why is the "Visual" tab missing in the formatting pane for a custom visual in Power BI?

The custom visual loses the "Visual" tab ...READ MORE

Jan 8 in Power BI by pooja
• 24,450 points
790 views
0 votes
0 answers

What are the best OT security tools for intrusion detection?

Detecting threats in OT environments requires specialized ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
156 views
0 votes
0 answers

How do IoT security tools detect rogue devices?

Unauthorized IoT devices on a network can ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
156 views
0 votes
0 answers

What methods protect CoAP-based IoT devices?

The Constrained Application Protocol (CoAP) is used ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
159 views
0 votes
0 answers

How does IoT firmware analysis expose vulnerabilities?

Analyzing IoT firmware helps identify security flaws ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
158 views
0 votes
0 answers

How to detect ARP spoofing using a Python script?

ARP spoofing is a technique used to ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
727 views
0 votes
1 answer

I need to merge two tables in Power Query but maintain a one-to-many relationship—what’s the best approach?

In Power Query, to merge two tables ...READ MORE

Mar 11 in Power BI by anonymous
• 36,180 points
453 views