Trending questions in Edureka Community

+1 vote
2 answers

How can I filter a dataset in Power BI to show records where a date column is less than the slicer value?

Filtering a dataset in Power BI to ...READ MORE

Jan 3, 2025 in Power BI by pooja
• 24,450 points
899 views
0 votes
0 answers

How would you handle a situation where a stakeholder is not satisfied with the project deliverables?

What would you do if a stakeholder ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
498 views
0 votes
1 answer

How do you resolve repetitive token generation in language models for creative writing?

Use techniques like top-k sampling, top-p (nucleus) ...READ MORE

Mar 11, 2025 in Generative AI by minato
466 views
0 votes
1 answer

GCP Generative AI - How can I refer my existing prompts from python code without sending full prompt contents in each requests?

To reference existing prompts in GCP Generative ...READ MORE

Mar 11, 2025 in Generative AI by chalo chale
463 views
0 votes
1 answer

Your Power BI dataset has millions of rows and is causing memory issues. How can you reduce the dataset size without losing key insights?

Here are a few cutting-edge optimization techniques ...READ MORE

Mar 7, 2025 in Power BI by anonymous
• 36,180 points
623 views
0 votes
0 answers

What tools do you use for project planning and scheduling?

What project planning and scheduling tools do ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
403 views
+1 vote
2 answers

Is it possible to extract Power BI metadata (e.g., dataset lineage) using Azure Data Factory?

Yes, you can extract typical metadata from ...READ MORE

Jan 3, 2025 in Power BI by pooja
• 24,450 points
894 views
0 votes
0 answers

What strategies do you use to optimize resource utilization?

What’s your go-to approach for making sure ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
403 views
0 votes
1 answer

How to Handle Blocking Threads in a Ruby Chat Server for Server Commands?

To handle blocking threads in a Ruby ...READ MORE

Mar 10, 2025 in Node-js by Tanvi
501 views
0 votes
0 answers

How do you handle scope creep that threatens the project timeline?

How do you handle scope creep when ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
409 views
0 votes
1 answer
0 votes
1 answer

How to delete a specific question-response pair from a local vector database?

To delete a specific question-response pair from ...READ MORE

Mar 13, 2025 in Generative AI by beginneing
387 views
0 votes
1 answer

Why am I unable to update Delta Live Tables, and what troubleshooting steps can I take to resolve the issue?

Well, in the case that you are ...READ MORE

Mar 3, 2025 in Power BI by anonymous
• 36,180 points
784 views
0 votes
0 answers

How does VoIP war dialing help in VoIP enumeration?

VoIP war dialing is used to scan ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
437 views
0 votes
1 answer

Firestore Integration Issue: Java.lang.VerifyError with WriteResponse after Updating Dependencies

A java.lang.VerifyError with WriteResponse in Firestore often ...READ MORE

Mar 12, 2025 in Generative AI by goblin
402 views
0 votes
0 answers

What’s the importance of sshd’s setting RekeyLimit?

The RekeyLimit setting in SSH controls how ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
435 views
0 votes
1 answer

HuggingFace tokens for 'model garden' not valid in Google console

Ensure your Hugging Face access token has ...READ MORE

Mar 11, 2025 in Generative AI by MLmadhav
443 views
+1 vote
2 answers

Is it possible to create report-level measures in Power BI while using a live query connection to an OLAP cube?

One of the restrictions is that, when ...READ MORE

Jan 13, 2025 in Power BI by pooja
• 24,450 points
737 views
+1 vote
2 answers

How can I keep DAX Studio connection credentials consistent between Power BI and Excel?

Strategies for preserving uniform connection credentials in ...READ MORE

Jan 8, 2025 in Power BI by pooja
• 24,450 points
756 views
0 votes
1 answer
0 votes
0 answers

Describe your approach to managing a project with a tight budget.

How do you manage a project when ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
387 views
0 votes
0 answers

How would you handle a situation where the project is behind schedule?

​If a project starts falling behind schedule, ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
386 views
+1 vote
2 answers

What are some common mistakes or challenges users face when working with Power BI Copilot, and how can they be avoided?

Separation of a few common hitches with ...READ MORE

Jan 3, 2025 in Power BI by pooja
• 24,450 points
873 views
0 votes
1 answer

How does the incognito prop differ from the cacheEnabled prop in React Native WebView?

Prop incognito cacheEnabled Purpose Enables private browsing mode. Controls whether the WebView ...READ MORE

Feb 23, 2025 in Node-js by Kavya
1,149 views
0 votes
1 answer

Why is my 503 site temporarily out of service?

Common Causes and Fixes Server Overload: High traffic or ...READ MORE

Mar 10, 2025 in Node-js by Tanvi
476 views
0 votes
1 answer

What solutions can reduce training time for large-scale generative models without compromising output quality?

Use techniques like mixed precision training, gradient ...READ MORE

Mar 11, 2025 in Generative AI by anupam mishra
431 views
0 votes
0 answers

When to use switchMap vs concatMap?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
760 views
0 votes
0 answers

What are the impacts of incorrect VPN configurations?

Misconfigured VPNs can lead to security vulnerabilities, ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
415 views
0 votes
0 answers

How do you balance quality requirements with time and budget constraints?

How do you balance delivering high-quality results ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
366 views
0 votes
0 answers

How do you balance risk mitigation with project constraints like time and budget?

How do you find the right balance ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
456 views
0 votes
0 answers

How does an attacker exploit SNMP v1 for enumeration?

SNMP v1 lacks strong security mechanisms, making ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
417 views
0 votes
0 answers

How to check file integrity in a read-write file system on Linux?

Ensuring file integrity is crucial for security ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
641 views
0 votes
0 answers

How do you prioritize project tasks when resources are limited?

When resources are tight, how do you ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
364 views
0 votes
1 answer

Python3 will not import file "apikey.py"

Ensure the file apikey.py is in the ...READ MORE

Mar 11, 2025 in Generative AI by hommie
423 views
0 votes
1 answer

Convert openAi functions to gemini function calling

You can convert the chatbot from NLTK-based functions ...READ MORE

Mar 11, 2025 in Generative AI by minnano nihongo
423 views
0 votes
1 answer

How to cancel HTTP request in Angular 8?

In Angular 8, you can cancel an ...READ MORE

Feb 26, 2025 in Angular by Kavya
980 views
0 votes
0 answers

What is the best approach to gathering project requirements from diverse stakeholders?

What’s the best way to gather project ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
358 views
0 votes
0 answers

Describe a time when you had to reallocate resources due to budget constraints.

Can you share a time when you ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
360 views
0 votes
0 answers

Describe your approach to implementing quality assurance processes in a project.

How do you build quality assurance into ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
359 views
0 votes
0 answers

What steps would you take if a key stakeholder is unresponsive?

How would you deal with a key ...READ MORE

Mar 11, 2025 in PMP by Parshvi
• 7,940 points
446 views
0 votes
0 answers

Which option can be used to authenticate the IPsec peers during IKE Phase 1?

IKE Phase 1 establishes a secure connection ...READ MORE

Mar 12, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
403 views
0 votes
0 answers

How do you prioritize stakeholder needs when resources are limited?

When resources are tight, how do you ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
363 views
0 votes
1 answer

Is Page Refresh Necessary for Route Re-Load in ReactJS?

No, a page refresh is not necessary ...READ MORE

Mar 6, 2025 in Java-Script by Anvi
622 views
0 votes
0 answers

Describe your process for conducting a risk assessment for a new project.

How do you approach risk assessment when ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
355 views
0 votes
0 answers

How do you manage stakeholder expectations when project delays are unavoidable?

How do you set realistic stakeholder expectations ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
347 views
0 votes
1 answer

What is the difference between active and passive Digital Footprints?

A digital footprint encompasses the trail of ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,674 views
+1 vote
2 answers

What processes occur internally in Power BI when a relationship is created between two tables?

When a relationship is created between two ...READ MORE

Jan 23, 2025 in Power BI by pooja
• 24,450 points
549 views
0 votes
0 answers

How do you handle a situation where additional funding is required mid-project?

What would you do if you realized ...READ MORE

Mar 13, 2025 in PMP by Parshvi
• 7,940 points
339 views
0 votes
1 answer