Trending questions in Edureka Community

0 votes
1 answer

How to use host bindings to bind properties to the host element in a component?

In Angular (2+), the @HostBinding() decorator allows ...READ MORE

Apr 10 in Node-js by anonymous
325 views
0 votes
1 answer

How can Monte Carlo simulations be applied for project risk forecasting in @Risk for Excel?

Monte Carlo simulations are one of the ...READ MORE

Apr 8 in PMP by Naira
411 views
0 votes
0 answers

Can Asana handle Gantt chart dependencies, or do I need to integrate another tool?

I’m using Asana for project planning and ...READ MORE

Apr 14 in PMP by Parshvi
• 7,940 points
150 views
0 votes
0 answers

What’s the best way to conduct asynchronous daily standups using Microsoft Teams bots?

I’ve got a distributed team spread across ...READ MORE

Apr 15 in PMP by Parshvi
• 7,940 points
125 views
0 votes
1 answer

How do you generate real-time project analytics using Google Looker Studio?

Google Looker Studio’s role in lightweight analytics ...READ MORE

Apr 8 in PMP by Naira
376 views
0 votes
0 answers

Propose a method to implement a contextual chatbot using LLamaIndex for customer support.

Can you tell me Propose a method ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 33,350 points
113 views
0 votes
1 answer

What’s the best way to visualize cumulative flow diagrams (CFD) in ClickUp Dashboards?

ClickUp enables showing Agile data, although Cumulative ...READ MORE

Apr 8 in PMP by Naira
399 views
0 votes
0 answers

How would you use LLamaIndex to build a semantic search engine for research papers?

Can you tell me How would you ...READ MORE

Apr 15 in Generative AI by Ashutosh
• 33,350 points
111 views
0 votes
1 answer

How do you use baseline variance analysis in Oracle Primavera to manage project delays?

Primavera P6 excels at baseline management. Variance ...READ MORE

Apr 8 in PMP by Naira
401 views
0 votes
1 answer

Create a pipeline for end-to-end QLoRA fine-tuning using PyTorch Lightning.

You can create an end-to-end QLoRA fine-tuning ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
268 views
0 votes
1 answer

How to implement adapter fusion in QLoRA for multi-task learning?

You can implement adapter fusion in QLoRA ...READ MORE

Apr 15 in Generative AI by nidhi
241 views
0 votes
1 answer

How to dynamically inject components into the DOM using @Component?

You need to use ComponentFactoryResolver and ViewContainerRef. ...READ MORE

Apr 10 in Node-js by anonymous
311 views
0 votes
1 answer

How do you implement TPU-optimized convolution layers for 3D data?

You can implement TPU-optimized convolution layers for ...READ MORE

Apr 16 in Generative AI by hoor
205 views
0 votes
1 answer

How to develop a pipe that formats phone numbers based on locale?

You can use the libphonenumber-js library for ...READ MORE

Apr 10 in Angular by anonymous
285 views
0 votes
1 answer

How to build a directive that listens for specific keyboard shortcuts?

You can use the @HostListener decorator to ...READ MORE

Apr 10 in Angular by anonymous
285 views
0 votes
1 answer
0 votes
1 answer

What’s the best way to automate issue triaging in Jira Service Management?

Efficient issue triaging in Jira Service Management ...READ MORE

Apr 8 in PMP by Naira
371 views
0 votes
1 answer

How do I configure Power BI Service to use DirectQuery efficiently?

In order to optimize DirectQuery in the ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
363 views
0 votes
1 answer

How do I calculate the most frequently occurring value in a column using DAX?

To find the mode in a column, ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
673 views
0 votes
1 answer

How to highlight specific dates with custom styles in jQuery UI Datepicker?

Here's how to highlight specific dates with ...READ MORE

Apr 7 in Node-js by anonymous
407 views
0 votes
1 answer

How do you set up Slack-based project alerts for real-time updates in ClickUp?

When set for action-based notifications, ClickUp and ...READ MORE

Apr 8 in PMP by Naira
366 views
0 votes
0 answers

How does idle scanning work in Nmap?

Idle scanning is a stealth technique used ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
152 views
0 votes
1 answer
0 votes
1 answer

How do I design a scatter plot where the axes change dynamically based on user selection?

The design of a scatter plot inside ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
364 views
0 votes
1 answer

How do you configure KPI dashboards in Power BI for Project Management?

Utilizing Power BI to track KPIs in ...READ MORE

Apr 8 in PMP by Naira
358 views
0 votes
1 answer

How to build a directive that conditionally adds elements to the DOM based on API responses?

Structural Directive with API Condition 1. Create the ...READ MORE

Apr 10 in HTML by anonymous
273 views
0 votes
1 answer

How can I implement workspace security to control report access at a granular level?

To enforce detailed workspace security in Power ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
353 views
0 votes
1 answer

How does Nessus perform vulnerability assessments?

​Nessus, developed by Tenable, is a widely ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
236 views
0 votes
1 answer

How do you implement auto-scheduling constraints in Microsoft Project for large-scale projects?

Microsoft Project’s auto-scheduling feature enables complicated timetables ...READ MORE

Apr 8 in PMP by Naira
381 views
0 votes
0 answers

What are the risks of IPv6 scanning compared to IPv4 scanning?

IPv6 has a much larger address space ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
130 views
0 votes
1 answer

What’s the best way to track critical chain project management (CCPM) using Smartsheet?

Tracking CCPM with Smartsheet requires some setup, ...READ MORE

Apr 8 in PMP by Naira
376 views
0 votes
1 answer

How can I use parameters to control API calls dynamically in Power Query?

Power Query can manage API calls dynamically ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
354 views
0 votes
1 answer

How do I troubleshoot refresh failures in Power BI Service that don’t occur in Desktop?

The first step in resolving Power BI ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
342 views
0 votes
1 answer

How can you implement static vs. dynamic sharding for TPU datasets?

You can implement static vs dynamic sharding ...READ MORE

Apr 15 in Generative AI by medha
214 views
0 votes
1 answer

How do you set up Kanban WIP limits in Trello for Agile teams?

Setting WIP (Work In Progress) limitations in ...READ MORE

Apr 8 in PMP by anonymous
369 views
0 votes
1 answer

How to implement a directive that manages focus on dynamically added elements?

To implement a directive that manages focus ...READ MORE

Apr 10 in Angular by anonymous
260 views
0 votes
1 answer

Write code to quantize activations in a Transformer architecture using QLoRA.

You can quantize activations in a Transformer ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
240 views
0 votes
1 answer

How to implement grid layouts with nested columns in jQuery Mobile?

The most effective way to implement nested ...READ MORE

Apr 7 in Node-js by anonymous
386 views
0 votes
1 answer

What role does SMB enumeration play in ransomware attacks?

​Server Message Block (SMB) enumeration is a ...READ MORE

Apr 9 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
306 views
0 votes
1 answer

How to create responsive tables using jQuery Mobile?

The most reliable and maintainable method for ...READ MORE

Apr 7 in Node-js by anonymous
384 views
0 votes
1 answer

How do you set up webhooks in Asana for automated task updates?

Asana webhooks for automation allow Agile teams ...READ MORE

Apr 8 in PMP by Naira
337 views
0 votes
1 answer

How do I make a Power BI report fully responsive for different screen sizes?

For a Power BI report to be ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
338 views
0 votes
1 answer

How can One-Shot Learning be used to detect signature forgery with minimal genuine signature samples for training?

You can use One-Shot Learning for signature ...READ MORE

Apr 14 in Generative AI by anonymous
• 33,350 points
232 views
0 votes
1 answer

How do you prioritize vulnerabilities in a risk-based approach?

​In a risk-based approach to vulnerability management, ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
257 views
0 votes
1 answer

How does Metasploit exploit vulnerabilities?

​Metasploit is a powerful open-source framework developed ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
214 views
0 votes
1 answer

What’s the safest way to store 2FA/MFA secret keys in a database?

​Storing Two-Factor Authentication (2FA) or Multi-Factor Authentication ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
558 views
0 votes
1 answer

How do you implement per-core tensor broadcasting in TPU systems?

You can implement per-core tensor broadcasting in ...READ MORE

Apr 16 in Generative AI by simran
184 views
0 votes
1 answer

What are the best enumeration countermeasures?

​Enumeration attacks involve malicious actors systematically probing ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
254 views
0 votes
1 answer

How to create a directive that validates input fields based on regex patterns?

You can define a custom directive that ...READ MORE

Apr 10 in Node-js by anonymous
271 views
0 votes
1 answer

How do I create a timeline visualization that shows overlapping events clearly?

Custom visualizations such as Gantt Chart or ...READ MORE

Apr 8 in Power BI by anonymous
• 36,180 points
329 views