Trending questions in Edureka Community

0 votes
1 answer
0 votes
1 answer

What are ICMP Echo Requests in host discovery?

​ICMP Echo Requests, commonly known as "ping" ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
621 views
0 votes
1 answer

How can I apply different transformations to different subsets of data in Power Query?

Different transformations can be applied to a ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
575 views
0 votes
1 answer

How do you prioritize vulnerabilities in a risk-based approach?

​In a risk-based approach to vulnerability management, ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
491 views
0 votes
1 answer

How to customize the default theme in jQuery Mobile CSS Framework?

Manual CSS Overrides Create a custom CSS file ...READ MORE

Apr 7, 2025 in Java-Script by anonymous
612 views
0 votes
0 answers

Write a solution to create a content moderation system using LLamaIndex for social media text.

Can you tell me Write a solution ...READ MORE

Apr 15, 2025 in Generative AI by Ashutosh
• 33,350 points
305 views
0 votes
1 answer

How do you configure KPI dashboards in Power BI for Project Management?

Utilizing Power BI to track KPIs in ...READ MORE

Apr 8, 2025 in PMP by Naira
565 views
0 votes
1 answer

How can you implement static vs. dynamic sharding for TPU datasets?

You can implement static vs dynamic sharding ...READ MORE

Apr 15, 2025 in Generative AI by medha
433 views
0 votes
1 answer

How do you implement TPU-optimized convolution layers for 3D data?

You can implement TPU-optimized convolution layers for ...READ MORE

Apr 16, 2025 in Generative AI by hoor
399 views
0 votes
1 answer

How does blockchain-based immutable logging improve project audit trails?

Blockchain technology excels in circumstances that need ...READ MORE

Apr 8, 2025 in PMP by Naira
603 views
0 votes
0 answers

How do you manage cross-functional team calendars in TeamGantt?

We have cross-functional teams using TeamGantt—how do ...READ MORE

Apr 15, 2025 in PMP by Parshvi
• 7,940 points
307 views
0 votes
1 answer

How do you set up custom report automation in Smartsheet Control Center?

Smartsheet Control Center plays a significant role ...READ MORE

Apr 8, 2025 in PMP by Naira
558 views
0 votes
1 answer

How does quantization noise affect model performance in QLoRA-tuned models?

You can analyze how quantization noise affects ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,350 points
454 views
0 votes
1 answer

How do I dynamically calculate the first and last transaction date for each customer?

Calculation of the first transaction date and ...READ MORE

Apr 1, 2025 in Power BI by anonymous
• 36,180 points
868 views
0 votes
1 answer

How do I reduce the impact of large cardinality fields on performance in Power BI?

Measures to mitigate the extent of performance ...READ MORE

Apr 1, 2025 in Power BI by anonymous
• 36,180 points
852 views
0 votes
1 answer

How does the CVSS scoring system classify vulnerabilities?

​The Common Vulnerability Scoring System (CVSS) is ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
475 views
0 votes
1 answer

What is the role of event chain methodology (ECM) in dynamic risk management?

Event Chain Methodology (ECM) elevates risk management ...READ MORE

Apr 8, 2025 in PMP by Naira
579 views
0 votes
0 answers

What’s the best way to conduct asynchronous daily standups using Microsoft Teams bots?

I’ve got a distributed team spread across ...READ MORE

Apr 15, 2025 in PMP by Parshvi
• 7,940 points
294 views
0 votes
1 answer

How can GitHub Actions be used for automated Agile reporting in Jira?

GitHub Actions is a powerful workflow automation ...READ MORE

Apr 8, 2025 in PMP by Naira
573 views
0 votes
1 answer

How to measure the impact of dynamic quantization in QLoRA on large datasets?

You can measure the impact of dynamic ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,350 points
444 views
0 votes
1 answer

What certifications do I need to become a Malware Analyst?

Pursuing specialized certifications can significantly enhance your ...READ MORE

Mar 26, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,134 views
0 votes
0 answers

Propose a method to implement a contextual chatbot using LLamaIndex for customer support.

Can you tell me Propose a method ...READ MORE

Apr 15, 2025 in Generative AI by Ashutosh
• 33,350 points
285 views
0 votes
1 answer

How to handle the swiperight event to trigger custom actions in jQuery Mobile?

To handle the swiperight event and trigger ...READ MORE

Apr 10, 2025 in Node-js by anonymous
487 views
0 votes
1 answer

Why is my favicon not working in my next js app?

If your favicon isn’t working in your ...READ MORE

Apr 3, 2025 in Node-js by anonymous
810 views
0 votes
1 answer

How would you perform rank tuning in QLoRA for a large language model?

You can perform rank tuning in QLoRA ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,350 points
439 views
0 votes
1 answer

How to implement swipe gestures for navigation in jQuery Mobile?

To enable swipe gestures for page navigation ...READ MORE

Apr 7, 2025 in Node-js by anonymous
587 views
0 votes
1 answer

How does Metasploit exploit vulnerabilities?

​Metasploit is a powerful open-source framework developed ...READ MORE

Apr 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
422 views
0 votes
1 answer

What are the best practices to avoid my server being port scanned?

​Port scanning is a technique used by ...READ MORE

Apr 4, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
723 views
0 votes
1 answer

How can LDAP enumeration be used to extract user details?

​Lightweight Directory Access Protocol (LDAP) is widely ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
548 views
0 votes
1 answer

How do you configure Zapier integrations for syncing tasks between Trello and Slack?

Zapier allows you to link Trello and ...READ MORE

Apr 8, 2025 in PMP by Naira
541 views
0 votes
1 answer

How do you implement per-core tensor broadcasting in TPU systems?

You can implement per-core tensor broadcasting in ...READ MORE

Apr 16, 2025 in Generative AI by simran
384 views
0 votes
1 answer

How to create a custom directive that integrates with external charting libraries?

Compact Directive for External Chart Integration import { ...READ MORE

Apr 10, 2025 in Angular by anonymous
448 views
0 votes
1 answer

How does NTP enumeration help in DDoS attacks?

​Network Time Protocol (NTP) enumeration involves gathering ...READ MORE

Apr 9, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
496 views
0 votes
1 answer

How can ChatGPT or Copilot AI assist with project documentation generation?

Artificial intelligence solutions such as ChatGPT and ...READ MORE

Apr 8, 2025 in PMP by Naira
534 views
0 votes
1 answer

What are the phases of the vulnerability-management lifecycle?

​The vulnerability management lifecycle is a continuous, ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
452 views
0 votes
2 answers

How do you mitigate the risks associated with schedule compression techniques?

Fast-tracking and crashing can help you advance ...READ MORE

Apr 4, 2025 in PMP by Naira
665 views
0 votes
0 answers

What are the risks of IPv6 scanning compared to IPv4 scanning?

IPv6 has a much larger address space ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
304 views
0 votes
1 answer

What are the key benefits of quantum project scheduling in high-uncertainty projects?

QPS is an advanced scheduling approach that ...READ MORE

Apr 4, 2025 in PMP by Naira
698 views
0 votes
1 answer

What’s the best way to automate regulatory compliance tracking using GRC tools?

GRC (Governance, Risk, and Compliance) technologies make ...READ MORE

Apr 8, 2025 in PMP by Naira
527 views
0 votes
1 answer

What’s the best way to implement drag-and-drop task dependencies in Monday.com?

Monday.com's Gantt View and Dependency Column provides ...READ MORE

Apr 8, 2025 in PMP by Naira
546 views
0 votes
1 answer

what is devops and test devops

test answer here READ MORE

Mar 19, 2025 in ChatGPT by Megha
• 160 points
1,371 views
0 votes
1 answer

How to disable weekends in jQuery UI Datepicker selection?

To disable weekends (Saturdays and Sundays) in ...READ MORE

Apr 7, 2025 in Node-js by anonymous
563 views
0 votes
1 answer

How do I set up automatic deployment of reports across multiple environments?

The adoption of Power BI Deployment Pipelines ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
515 views
0 votes
0 answers

How to handle multiple accordions on a single page with jQuery UI?

Can i know How to handle multiple ...READ MORE

Apr 7, 2025 in Java-Script by Ashutosh
• 33,350 points
608 views
0 votes
1 answer

How do I add advanced conditional formatting to a matrix visual based on multiple measures?

To add advanced conditional formatting to a ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
518 views
0 votes
1 answer

How do you set up automated workload balancing in Asana?

Asana's automated workload balancing ensures that team ...READ MORE

Apr 8, 2025 in PMP by Naira
537 views
0 votes
1 answer

How does IDS detect network scanning?

​Intrusion Detection Systems (IDS) are essential for ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
521 views
0 votes
0 answers

How would you use LLamaIndex to build a semantic search engine for research papers?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Ashutosh
• 33,350 points
249 views
0 votes
0 answers

How to create a single-page navigation system using jQuery Mobile?

Can you tell me How to create ...READ MORE

Apr 7, 2025 in Node-js by Nidhi
• 16,260 points
600 views
0 votes
1 answer

What techniques are used in DNS Cache Snooping?

​DNS Cache Snooping, also known as DNS ...READ MORE

Apr 9, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
473 views