Trending questions in Edureka Community

0 votes
0 answers

What is the first step in using Burp Suite for web application security testing?

Burp Suite is a powerful tool for ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
505 views
0 votes
0 answers

How do you use DecisionTreeClassifier and visualize the decision tree using Scikit-learn’s plot_tree?

With the help of proper code can ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
540 views
0 votes
0 answers

What’s your approach to managing remote teams with limited oversight?

I’m curious about how people manage remote ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
453 views
0 votes
2 answers

How can you partially load data into Power BI Desktop to optimize performance?

Use Power Query filters in Power BI ...READ MORE

Apr 3, 2025 in Power BI by anonymous
• 24,450 points
1,409 views
0 votes
1 answer

How do you handle nested dynamic routes with React-Router?

Handling Nested Dynamic Routes in React Router ...READ MORE

Feb 24, 2025 in Node-js by Kavya
841 views
0 votes
0 answers

How can you address token misalignment when using pre-trained models for machine translation?

Can you tell me How can you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
535 views
0 votes
1 answer
0 votes
0 answers

How do you fix token prediction anomalies during the training phase of a text-to-image generator?

Can i know How do you fix ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
533 views
0 votes
1 answer

How to run a scan equivalent to nmap vulnerabilities scan?

Nmap is a versatile network scanning tool ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
934 views
0 votes
0 answers

How would you address language ambiguity in generated text using a language model for content generation?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
530 views
0 votes
0 answers

How do you create buy-in for a project facing internal opposition?

I’m curious about how to create buy-in ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
445 views
0 votes
0 answers

How do you evaluate the AUC-ROC curve for a binary classification model in Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
531 views
0 votes
1 answer

How do you create protected routes in React?

Creating Protected Routes in React (React Router ...READ MORE

Feb 23, 2025 in Node-js by Kavya
848 views
0 votes
0 answers

Which improvements does IPv6 provide over the current IP addressing scheme?

IPv6 was introduced to overcome the limitations ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
671 views
0 votes
1 answer

How do you detect brute force login attempts in Apache logs?

Monitoring Apache web server logs is essential ...READ MORE

Feb 19, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,012 views
0 votes
0 answers

How does a password manager increase security?

Password managers store and generate strong, unique ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
497 views
+1 vote
2 answers

What are some practical examples of how Power BI Copilot can assist with building DAX measures and queries?

Power BI Copilot can make building DAX ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
776 views
0 votes
0 answers

How would you handle a rapid scope expansion by key stakeholders?

What do you do when major stakeholders ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
441 views
0 votes
0 answers

Can we apply two pipes together in Angular?

I doubt it. Can we apply two ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
494 views
+1 vote
2 answers

What tools and features in Power BI Fabric are best suited for visualizing time-series data in a narrative context?

Visual solids: An effective visual would be ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6, 2025 775 views
0 votes
1 answer
0 votes
1 answer

How do you handle a large amount of data in React?

Handling Large Amounts of Data in React To ...READ MORE

Feb 24, 2025 in Node-js by Kavya
816 views
0 votes
0 answers

Describe your approach to defining project scope when requirements are not clearly outlined.

When the project requirements aren’t clear from ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
441 views
0 votes
2 answers

What strategies can you use to handle the Power BI Gateway refresh limit?

Optimize Power BI Gateway refresh by using ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 24,450 points
1,711 views
0 votes
1 answer

How to preload a component in Angular?

In Angular, components are not preloaded directly, ...READ MORE

Feb 24, 2025 in Angular by Navya
782 views
0 votes
0 answers

How can you prevent bias amplification in text generation models when using biased data sources?

With the help of code can you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
519 views
0 votes
0 answers

How to check integrity of a file in Linux?

I want to verify whether a file ...READ MORE

Feb 26, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
703 views
0 votes
0 answers

What are the key differences between LSTM and GRU when applying them to time series forecasting?

Can i know What are the key ...READ MORE

Feb 24, 2025 in Generative AI by Ashutosh
• 33,350 points
756 views
0 votes
0 answers

How would you address tokenization errors in a GPT-3 model when generating natural language text?

With the help of code can you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
517 views
0 votes
0 answers

How do you implement K-means++ initialization in KMeans clustering using Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
516 views
0 votes
0 answers

How to detect unauthorized USB device insertion?

Unauthorized USB devices can pose serious security ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
384 views
0 votes
0 answers

How do you manage vendor delays that impact the project timeline?

I'm managing a project, and vendor delays ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
671 views
0 votes
0 answers

How is salting used to increase the security of a user's stored password?

Salting adds a unique random value to ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
482 views
0 votes
1 answer

How can you configure routing for a multi-page React application using React-Router?

To configure routing for a multi-page React ...READ MORE

Feb 23, 2025 in Node-js by Kavya
830 views
0 votes
0 answers

How to use AI to predict cyber threats using Python?

Machine learning models can analyze network traffic ...READ MORE

Mar 5, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
434 views
0 votes
0 answers

How do you use SVC with RBF kernel for classification on a non-linear dataset in Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
510 views
0 votes
1 answer

How can you log and inspect request and response headers in Angular?

In Angular, you can log request and ...READ MORE

Feb 25, 2025 in Angular by Navya
735 views
0 votes
0 answers

How do you deal with unexpected changes in client personnel?

I'm working on a project, and one ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
664 views
0 votes
1 answer

What is the difference between Hooks and router in React?

Feature Hooks React Router Definition Functions that manage state and side ...READ MORE

Feb 24, 2025 in Node-js by Kavya
811 views
0 votes
0 answers

How do you establish accountability within a cross-functional team?

I’m curious about how you make sure ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
419 views
0 votes
1 answer

How does an attacker escalate privileges via SUID misconfigurations?

In Unix-like operating systems, the Set User ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
905 views
+1 vote
1 answer

How can I embed Power BI reports into a Xamarin mobile application?

Embedding Power BI reports into a Xamarin ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
549 views
0 votes
1 answer

How do you use Link and NavLink differently?

Feature <Link> <NavLink> Purpose Used for navigation between routes. Used for navigation ...READ MORE

Feb 24, 2025 in Node-js by Kavya
804 views
0 votes
0 answers

What techniques resolve length truncation issues when generating long-form text using transformers?

Can you tell me What techniques resolve ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
497 views
0 votes
0 answers

How do you prevent output distortion in GPT-2 models when generating technical articles?

With the help of code can i ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
495 views
0 votes
0 answers

How does network scanning help in security assessments?

Network scanning is used to identify active ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
638 views
0 votes
1 answer

How would you manage the state between different components of the site?

Method Description Best For Props (Parent to Child) Pass data from ...READ MORE

Feb 24, 2025 in Node-js by Kavya
799 views
0 votes
0 answers

How is MITRE ATT&CK used?

MITRE ATT&CK is a framework that maps ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
362 views
0 votes
0 answers

What steps would you take if a project sponsor requests a significant change after the project has been initiated?

If a project sponsor asks for a ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
410 views