Trending questions in Edureka Community

0 votes
1 answer

How can you embed Agile KPIs into a project dashboard?

Adding Agile Key Performance Indicators (KPIs) to ...READ MORE

Apr 15 in PMP by Naira
176 views
0 votes
1 answer

What are the implications of incomplete retrospectives on team performance?

Retrospectives are an important Agile ceremony that ...READ MORE

Apr 15 in PMP by Naira
176 views
0 votes
1 answer

How do you perform S-Curve analysis for project financial performance?

The S-curve analysis measures cumulative cost, effort, ...READ MORE

Apr 14 in PMP by Naira
223 views
0 votes
1 answer

How does AI predict attack vectors in enumeration?

​AI enhances cybersecurity by predicting potential attack ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
228 views
0 votes
1 answer

What strategies can you implement for resolving embedding mismatches in LLamaIndex?

You can resolve embedding mismatches in LlamaIndex ...READ MORE

Apr 21 in Generative AI by nimona
179 views
0 votes
0 answers

Write a Python server that streams LLM responses using WebSockets.

Can you Write a Python server that ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
161 views
0 votes
0 answers
0 votes
0 answers

What are the best practices for deploying TPU-trained models to production systems?

Can you explian to me What are ...READ MORE

Apr 8 in Generative AI by Ashutosh
• 33,350 points
513 views
0 votes
0 answers

How would you prevent unauthorized prompt injections in an API-based LLM service?

With the help of proper code example ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
167 views
0 votes
1 answer

Do firewalls protect against port scanning?

​Yes, firewalls can detect and block port ...READ MORE

Apr 15 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
183 views
0 votes
1 answer

How do AI-powered scanners compare with traditional tools?

​AI-powered vulnerability scanners represent a significant advancement ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
337 views
0 votes
1 answer

How can spoofing attacks be prevented?

​Spoofing attacks involve impersonating trusted entities to ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
202 views
0 votes
1 answer

How do firewalls detect and block scanning attempts?

​Firewalls play a crucial role in network ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
328 views
0 votes
0 answers

Modify a Hugging Face generate() function to improve real-time token streaming speed.

Can i know Modify a Hugging Face ...READ MORE

Apr 16 in Generative AI by Nidhi
• 16,260 points
139 views
0 votes
1 answer

What is CVE, and how does it help in vulnerability tracking?

​Common Vulnerabilities and Exposures (CVE) is a ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
370 views
0 votes
0 answers

How to implement speculative decoding for a multi-turn chatbot using a small draft model.

Can you tell me How to implement ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
178 views
0 votes
1 answer

How does Honeypot analysis help detect scanners?

​Honeypots are decoy systems designed to mimic ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
320 views
0 votes
0 answers

How can reinforcement learning be used to enforce ethical constraints on an AI chatbot?

Can you tell me How can reinforcement ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
131 views
0 votes
0 answers

How do I generate real-time dashboards in Monday.com for stakeholder reporting?

I’m trying to build real-time dashboards in ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
206 views
0 votes
0 answers

How would you convert unstructured text data into a structured format for LLM fine-tuning?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
174 views
0 votes
0 answers

How would you distill a 7B model into a 1.5B model while retaining key capabilities?

May i know How would you distill ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
136 views
0 votes
1 answer

How do I create a column that extracts the last numeric value from a string?

In Power BI, Power Query (M language) ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
439 views
0 votes
0 answers

How can you ensure that sensitive data isn’t leaked in a RAG-based chatbot?

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
135 views
0 votes
1 answer

How do attackers bypass SNMP security restrictions?

​Attackers can bypass SNMP (Simple Network Management ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
184 views
0 votes
1 answer

How to prepare a VAPT report?

​A Vulnerability Assessment and Penetration Testing (VAPT) ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
311 views
0 votes
1 answer

Create a function for custom parameter initialization in QLoRA fine-tuning.

You can create a custom parameter initialization ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
325 views
0 votes
0 answers

How can I schedule automated data refresh with notification alerts?

How can I schedule automated data refresh ...READ MORE

Apr 16 in Power BI by pooja
• 24,450 points
118 views
0 votes
0 answers

In a chatbot system, how can KV caching be optimized to reduce redundant computations?

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
166 views
0 votes
1 answer

How to implement a pipe that capitalizes the first letter of each word in a string?

To create a pipe in Angular that ...READ MORE

Apr 10 in Angular by anonymous
344 views
0 votes
1 answer

How to implement a directive that auto-saves form data periodically?

To create a directive that automatically saves ...READ MORE

Apr 10 in Node-js by anonymous
368 views
0 votes
1 answer

How to create a pipe that converts timestamps to relative time strings (e.g., '2 hours ago')?

You can use the date-fns library for ...READ MORE

Apr 10 in Angular by anonymous
338 views
0 votes
0 answers

How would you design a generative model that self-corrects biased or hallucinated outputs?

With the help of code can you ...READ MORE

Apr 16 in Generative AI by Ashutosh
• 33,350 points
124 views
0 votes
0 answers
0 votes
1 answer

Write a script to log validation perplexity during QLoRA training.

You can log validation perplexity during QLoRA ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
314 views
0 votes
1 answer

How can I transform nested JSON data into a structured table format?

Use Power BI Power Query transformation to ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
422 views
0 votes
0 answers

How would you integrate global and local attention for an optimized summarization model?

Can i know How would you integrate ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
151 views
0 votes
1 answer

What’s the best way to use REST APIs for syncing data between Jira and SAP ERP?

Jira-SAP ERP integration enhances the alignment between ...READ MORE

Apr 8 in PMP by Naira

reshown Apr 8 by Neelam 412 views
0 votes
1 answer

How does AI improve vulnerability detection?

​Artificial Intelligence (AI) significantly enhances vulnerability detection ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
329 views
0 votes
0 answers

How would you align token embeddings across two different LLMs for cross-model compatibility?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
142 views
0 votes
1 answer

What’s the best way to use automated speech-to-text meeting minutes in Otter.ai for Agile teams?

Using Otter.ai for Agile teams may greatly ...READ MORE

Apr 8 in PMP by Naira

reshown Apr 8 by Neelam 399 views
0 votes
1 answer

How to create a structural directive that renders elements based on user permissions?

Here's how to create a structural directive ...READ MORE

Apr 10 in Node-js by anonymous
339 views
0 votes
0 answers

How do you manage cross-functional team calendars in TeamGantt?

We have cross-functional teams using TeamGantt—how do ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
144 views
0 votes
0 answers

How would you implement MoE to optimize inference efficiency while keeping model quality high?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
133 views
0 votes
0 answers
0 votes
0 answers

Write a solution to create a content moderation system using LLamaIndex for social media text.

Can you tell me Write a solution ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 33,350 points
132 views
0 votes
0 answers

Implement a multi-document summarization tool using LLamaIndex.

With the help of code can i ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 33,350 points
127 views
0 votes
1 answer

How to prevent default scrolling behavior during touch events in jQuery Mobile?

To prevent the default scrolling behavior during ...READ MORE

Apr 10 in Node-js by anonymous
329 views
0 votes
1 answer

What’s the best way to track sprint velocity trends using Domo?

Domo's approach to sprint velocity tracking allows ...READ MORE

Apr 8 in PMP by Naira
386 views
0 votes
0 answers

Write code to implement stopword filtering for preprocessing text data for LLM tasks.

Can i know Write code to implement ...READ MORE

Apr 15 in Generative AI by Nidhi
• 16,260 points
124 views