Trending questions in Edureka Community

0 votes
0 answers

What’s your approach to handling project setbacks caused by miscommunication?

How do you deal with project delays ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
350 views
0 votes
1 answer

How to build an Angular project?

To build an Angular project, follow these ...READ MORE

Feb 25 in Angular by Navya
444 views
0 votes
0 answers

How do you handle communication issues with an international team?

I’m working with an international team, and ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
349 views
0 votes
1 answer

How would you use NavLink to style active navigation links in a React application?

You can use the <NavLink> component to ...READ MORE

Feb 23 in Node-js by Kavya
534 views
0 votes
1 answer

Can we create a custom directive in Angular?

You can create a custom directive in ...READ MORE

Feb 26 in Angular by Tanya
398 views
0 votes
1 answer

How do you choose the root node while constructing a decision tree?

Selecting the root node in a decision ...READ MORE

Feb 25 in Node-js by Navya
441 views
0 votes
2 answers

What are the best practices for structuring a narrative-driven report in Power BI using Fabric?

Use a guided layout with clear visual ...READ MORE

Apr 8 in Power BI by anonymous
• 24,450 points
776 views
0 votes
0 answers

How do you handle conflicting stakeholder feedback on deliverables?

I'm currently working on a project where ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
370 views
0 votes
0 answers

How to check integrity of a file in Linux?

I want to verify whether a file ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
396 views
0 votes
0 answers

How to identify privilege escalation attempts in Linux logs?

I need to monitor Linux logs for ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
439 views
0 votes
1 answer

How do you implement routing in a React application?

Implementing Routing in a React Application (React ...READ MORE

Feb 23 in Node-js by Kavya
529 views
0 votes
1 answer

How do you design a data model for a social media platform using MongoDB?

Design a MongoDB data model for a ...READ MORE

Feb 23 in Node-js by Kavya
531 views
0 votes
0 answers

How does OAuth 2.0 manage access in web applications?

OAuth 2.0 is widely used for secure ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
297 views
0 votes
1 answer

How to run a scan equivalent to nmap vulnerabilities scan?

Nmap is a versatile network scanning tool ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
608 views
0 votes
2 answers

How can you implement proper indentation in a Power BI matrix report?

To implement proper indentation in a Power ...READ MORE

Apr 1 in Power BI by anonymous
• 24,450 points
1,145 views
0 votes
0 answers
0 votes
1 answer

What is the default response type of HttpClient service?

By default, HttpClient assumes the server response ...READ MORE

Feb 25 in Node-js by Navya
432 views
0 votes
0 answers

How do I utilize Keras Callbacks to implement early stopping during model training?

With the help of python programming can ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
442 views
0 votes
0 answers

How do I use Keras to train a Bidirectional LSTM model for sentence classification?

With the help of code can you ...READ MORE

Feb 24 in Generative AI by Vani
• 3,580 points
421 views
0 votes
1 answer

What is the best proper way to create the meta data for your page?

Best Way to Set Metadata in a ...READ MORE

Feb 24 in Java-Script by Kavya
496 views
0 votes
0 answers

How do you assess project viability if objectives remain uncertain?

How do you decide if a project ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
333 views
0 votes
0 answers

How do you keep the team focused if they lack interest in the project topic?

I've been in situations where the team ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
419 views
0 votes
0 answers

What’s your method for quickly evaluating vendor reliability?

How do you quickly figure out if ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
332 views
+1 vote
1 answer
0 votes
1 answer

How do you use Journaling for write concern in MongoDB?

Using Journaling for Write Concern in MongoDB Journaling ...READ MORE

Feb 23 in Node-js by Kavya
520 views
0 votes
1 answer

Is it possible to handle React events using the Chrome extension?

Yes, it's possible to handle React events ...READ MORE

Feb 22 in Node-js by Kavya
582 views
0 votes
2 answers

How do I choose between Power BI Premium, Power BI Embedded, and Azure Analysis Services for different use cases?

Choose Power BI Premium for internal enterprise ...READ MORE

Apr 8 in Power BI by anonymous
• 24,450 points
761 views
0 votes
0 answers
0 votes
1 answer

How do I fix a 401 unauthorized status code?

A 401 Unauthorized status code means the ...READ MORE

Feb 26 in Angular by Kavya
377 views
+1 vote
1 answer
0 votes
1 answer

How to secure a WordPress site from Brute Force Attacks?

Securing your WordPress site against brute force ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points

reshown Mar 12 by Anupam 421 views
0 votes
0 answers
0 votes
1 answer

Is there a way to ignore touch events on Text in React Native, or can they be managed differently?

Yes! In React Native, you can ignore ...READ MORE

Feb 22 in Node-js by Kavya
576 views
0 votes
0 answers

Why does enabling multi-factor authentication increase your security?

Multi-factor authentication (MFA) adds an extra layer ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
281 views
0 votes
0 answers

How can I implement word embedding using Keras for semantic text analysis?

With the help of proper code can ...READ MORE

Feb 24 in Generative AI by Vani
• 3,580 points
408 views
0 votes
0 answers

How do RBAC and ABAC models regulate access control?

Role-Based Access Control (RBAC) and Attribute-Based Access ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
280 views
0 votes
1 answer

How would you implement a chat application using MongoDB’s data model patterns?

To implement a chat application using MongoDB’s ...READ MORE

Feb 23 in Node-js by Kavya
510 views
0 votes
0 answers

What is zero-trust security in access administration?

Zero-trust security follows the principle of "never ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
279 views
0 votes
0 answers

What’s your approach to maintaining project quality during budget cuts?

I'm currently managing a project where we're ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
343 views
0 votes
0 answers

When should you use TCP over UDP for network communication?

TCP and UDP have different strengths based ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
324 views
0 votes
0 answers

How do I adjust Keras callbacks to log training progress into a TensorBoard?

Can i know How do I adjust ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
413 views
0 votes
1 answer

How do you model a many-to-many relationship in MongoDB with an example?

In MongoDB, a many-to-many relationship can be ...READ MORE

Feb 23 in Node-js by Kavya
499 views
0 votes
1 answer

What is the use of Switch in React Router?

In React Router v5, <Switch> is used ...READ MORE

Feb 23 in Node-js by Kavya
497 views
+1 vote
1 answer
0 votes
1 answer

How would you dynamically generate routes from an API response?

To dynamically generate routes from an API ...READ MORE

Feb 24 in Node-js by Kavya
466 views
0 votes
1 answer

What is the difference between React Synthetic Events and Native JavaScript Events, or how do they compare?

Feature React Synthetic Events (SyntheticEvent) Native JavaScript Events (Event) Definition React’s ...READ MORE

Feb 22 in Node-js by Kavya
558 views
0 votes
1 answer

How can I determine whether a JavaScript object is empty?

Use Object.keys(obj).length === 0 to check if ...READ MORE

Feb 23 in Java-Script by Kavya
493 views
+1 vote
1 answer