Trending questions in Edureka Community

+1 vote
1 answer

What is the best approach to convert a Date/Time column to a Date data type in Power Query while using DirectQuery from SQL?

For DirectQuery, the best way to convert ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
1,145 views
0 votes
0 answers

How do you deal with unexpected external risks (e.g., regulatory changes, economic shifts)?

How do you deal with unexpected risks, ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
498 views
0 votes
1 answer
0 votes
0 answers

How do you ensure alignment between project goals and business objectives?

How do you make sure a project’s ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
497 views
0 votes
0 answers

How do you manage a project where stakeholders have conflicting priorities?

How do you handle situations where different ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
485 views
0 votes
1 answer

How to Center a Single-Column Div Within a 12-Column Container in Bootstrap 3?

Using Bootstrap's Offset Classes Bootstrap 3 provides offset ...READ MORE

Mar 11, 2025 in Node-js by Tanvi
711 views
0 votes
0 answers

Which of the following tools are used for network scanning?

There are multiple tools available for scanning ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
1,235 views
0 votes
1 answer

How to add an attention mechanism in keras?

An attention mechanism in Keras can be ...READ MORE

Mar 17, 2025 in Generative AI by meheta
562 views
0 votes
0 answers

How do you estimate project timelines accurately?

How do you estimate project timelines accurately ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
492 views
0 votes
0 answers

How to create an action creator that dispatches multiple actions during an async operation?

With the help of programming can you ...READ MORE

Mar 19, 2025 in Node-js by Ashutosh
• 33,350 points
407 views
0 votes
1 answer

Haystack PipelineConnectError: Cannot connect 'replies_to_query.output' with 'bm25_retriever.query'

The PipelineConnectError in Haystack when using a ...READ MORE

Mar 17, 2025 in Generative AI by rupesh singh
559 views
0 votes
1 answer

What’s the best way to index my SQL database to speed up DirectQuery performance in Power BI?

Here's a demo of some effective indexing ...READ MORE

Mar 11, 2025 in Power BI by anonymous
• 36,180 points
703 views
0 votes
1 answer

Stacking in Displaying Self Attention weights in a bi-LSTM with attention mechanism

Stacking in displaying self-attention weights in a ...READ MORE

Mar 17, 2025 in Generative AI by Ashutosh
• 33,350 points
447 views
+1 vote
1 answer

What are common reasons why DirectQuery fails when publishing to Power BI Service, and how can this be resolved?

When publishing to the Power BI Service, ...READ MORE

Feb 24, 2025 in Power BI by anonymous
• 36,180 points
1,302 views
0 votes
0 answers

Can a password cracker reverse engineer my generation method?

Password crackers use various techniques to break ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
397 views
0 votes
1 answer

Attention mechanism for sequence classification (seq2seq tensorflow r1.1)

To implement an attention mechanism for sequence ...READ MORE

Mar 17, 2025 in Generative AI by nihongio
549 views
0 votes
1 answer

Why isn't my h3 element content matching with the array contents?

Your <h3> element content might not match ...READ MORE

Mar 12, 2025 in Generative AI by radhikha
661 views
0 votes
1 answer

How to install Jest and React Testing Library in TypeScript?

To install and configure Jest and React ...READ MORE

Mar 6, 2025 in Java-Script by Anvi
920 views
0 votes
0 answers

What strategies do you use to build trust with project stakeholders?

How do you build and maintain trust ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
471 views
0 votes
0 answers

How do IoT security tools detect rogue devices?

Unauthorized IoT devices on a network can ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
389 views
0 votes
0 answers

What are the best reporting tools for project tracking?

Keeping track of project progress is crucial, ...READ MORE

Mar 19, 2025 in PMP by Parshvi
• 7,940 points
385 views
0 votes
0 answers

How do you handle data scarcity when generating realistic outputs in data-hungry applications?

With the help of code can you ...READ MORE

Mar 20, 2025 in Generative AI by Ashutosh
• 33,350 points
352 views
0 votes
0 answers

How does IoT firmware analysis expose vulnerabilities?

Analyzing IoT firmware helps identify security flaws ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
390 views
0 votes
1 answer

I need to compute a year-over-year (YoY) growth rate but only for months where I have data in both years—how do I do this?

Calculating Year-over-Year (YoY) growth only for those ...READ MORE

Mar 10, 2025 in Power BI by anonymous
• 36,180 points
742 views
0 votes
1 answer

Attention mechanism in spelling correction model

An attention mechanism in a spelling correction ...READ MORE

Mar 17, 2025 in Generative AI by anupam mishra
547 views
0 votes
1 answer

How does Babel differ from JSX?

Feature Babel JSX Definition A JavaScript compiler that transforms ES6+ code ...READ MORE

Mar 12, 2025 in Java-Script by Sahil
649 views
0 votes
0 answers

What are the biggest challenges in initiating a new project?

What are some of the biggest challenges ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
476 views
0 votes
0 answers

What are the best OT security tools for intrusion detection?

Detecting threats in OT environments requires specialized ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
383 views
0 votes
0 answers

What factors do you consider when selecting a project methodology (Agile, Waterfall, etc.)?

What factors help you decide whether to ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
475 views
0 votes
0 answers

What methods protect CoAP-based IoT devices?

The Constrained Application Protocol (CoAP) is used ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
386 views
0 votes
0 answers

What is Artificial Intelligence ?

What is Artificial Intelligence ? and what ...READ MORE

Mar 20, 2025 in Generative AI by Rajeswari
• 140 points
343 views
0 votes
1 answer

How can you work with an object in React Hooks' useState?

In React Hooks, useState can store and ...READ MORE

Mar 12, 2025 in Node-js by Tanvi
641 views
0 votes
1 answer

How can I use LangChain and Google Gemini Pro to extract and store embeddings of PDF content in Pinecone?

You can use LangChain with Google Gemini ...READ MORE

Mar 12, 2025 in Generative AI by namit
663 views
0 votes
1 answer

How do I create an optimized star schema for Power BI when dealing with high-cardinality dimensions?

Here are a few tips to properly ...READ MORE

Mar 11, 2025 in Power BI by anonymous
• 36,180 points
682 views
+1 vote
2 answers

How can I extract embedded Excel data from PowerPoint slides for analysis?

Make Extraction of Embedded Excel Data from ...READ MORE

Jan 8, 2025 in Power BI by pooja
• 24,450 points
1,008 views
0 votes
0 answers

How can IoT threat modeling prevent cyber attacks?

Threat modeling helps identify and mitigate security ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
376 views
0 votes
1 answer

How to exploit LFI to retrieve sensitive files in NGINX?

Local File Inclusion (LFI) vulnerabilities occur when ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,463 views
0 votes
1 answer

How does the incognito prop differ from the cacheEnabled prop in React Native WebView?

Prop incognito cacheEnabled Purpose Enables private browsing mode. Controls whether the WebView ...READ MORE

Feb 23, 2025 in Node-js by Kavya
1,398 views
+1 vote
2 answers

Why is my DAX measure for dynamic percent change returning no value?

It is often noted that the problem ...READ MORE

Jan 8, 2025 in Power BI by pooja
• 24,450 points
1,001 views
0 votes
0 answers

How do you handle a situation where risk mitigation efforts fail?

What would you do if your risk ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
460 views
0 votes
0 answers

What steps do you take when a key stakeholder is unresponsive?

What steps do you take when a ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
448 views
0 votes
1 answer

How can I install the Babel plugin for JSX syntax?

Use the following commands: npm install @babel/preset-react --save-dev Steps ...READ MORE

Mar 12, 2025 in Node-js by Sahil
629 views
0 votes
1 answer

How can I animate list items when they are added or removed in Angular?

In Angular, you can animate list items ...READ MORE

Mar 11, 2025 in Angular by Tanmay
670 views
0 votes
0 answers

How do you keep stakeholders informed without overwhelming them with details?

How do you keep stakeholders updated without ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
445 views
0 votes
0 answers

How to manage async API calls in a React app using redux-thunk?

Can you tell me How to manage ...READ MORE

Mar 19, 2025 in Node-js by Ashutosh
• 33,350 points
372 views
0 votes
0 answers

How do you manage stakeholder expectations when facing project delays?

How do you set and manage stakeholder ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
444 views
0 votes
1 answer

How to handle asynchronous actions in Redux with Redux-Saga for complex data fetching scenarios?

To handle asynchronous actions in Redux for ...READ MORE

Mar 10, 2025 in Node-js by Tanvi
718 views
0 votes
0 answers

How do you handle project delays that are beyond your control?

How do you deal with project delays ...READ MORE

Mar 18, 2025 in PMP by Parshvi
• 7,940 points
412 views