Trending questions in Edureka Community

0 votes
1 answer

why react native project is creating in typescript ? i want app.js

React Native may default to TypeScript based ...READ MORE

Apr 2 in Node-js by anonymous
465 views
0 votes
0 answers

What is the process for running custom operations on TPUs in TensorFlow?

Can i know What is the process ...READ MORE

Apr 7 in Generative AI by Nidhi
• 16,260 points
255 views
0 votes
0 answers

How can you adapt a masked language model using QLoRA?

With the help of proper code can ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 33,350 points
255 views
0 votes
1 answer

How do I calculate the average time between two events for each customer?

To calculate the average time between two ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
474 views
0 votes
0 answers

How would you integrate QLoRA with ONNX Runtime for inference?

With the help of code can i ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 33,350 points
254 views
0 votes
1 answer

How does the Program Evaluation and Review Technique (PERT) improve time estimation accuracy?

PERT is an excellent tool for estimating ...READ MORE

Apr 4 in PMP by Naira
353 views
0 votes
1 answer

How to create a password input field in a form in HTML?

To create a secure password input field ...READ MORE

Apr 4 in Node-js by anonymous
414 views
0 votes
0 answers

How do you implement a cross-replica operation on TPUs?

Can you tell me How do you ...READ MORE

Apr 7 in Generative AI by Nidhi
• 16,260 points
250 views
0 votes
1 answer

How do i upgrade a total in a useState when i edit cell in MUI X Data Grid?

To update a total value stored in ...READ MORE

Apr 2 in Node-js by anonymous
458 views
0 votes
0 answers
0 votes
0 answers

How to validate the generalization gap in QLoRA-adapted models?

Can you tell me How to validate ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 33,350 points
247 views
0 votes
1 answer

How can I schedule data refresh for a Power BI report that connects to an on-prem SQL Server via a gateway?

The following steps will help you schedule ...READ MORE

Mar 24 in Power BI by anonymous
• 36,180 points
809 views
0 votes
1 answer

How do you handle residual risks after implementing mitigation strategies?

Even after risk mitigation, some risk remains; ...READ MORE

Apr 4 in PMP by Naira
342 views
0 votes
0 answers

How do you integrate Qualys Risk Management with ServiceNow ITBM? W

I’m looking into integrating Qualys Risk Management ...READ MORE

Apr 7 in PMP by Parshvi
• 7,940 points
248 views
0 votes
0 answers

How do you perform on-the-fly data augmentation on TPUs?

With the help of proper code can ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 33,350 points
239 views
0 votes
1 answer

What are the challenges in applying Bayesian inference to risk modeling?

Bayesian inference is powerful for updating risk ...READ MORE

Apr 4 in PMP by Naira
338 views
0 votes
1 answer

How do I optimize a measure that involves multiple nested IF conditions?

To optimize a Power BI measure with ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
452 views
0 votes
1 answer

How would a professional hacker penetrate a computer in a network?

​Penetration testing, often referred to as ethical ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
328 views
0 votes
1 answer

How would you use the TPU profiler to analyze and optimize model performance?

The TPU profiler helps identify bottlenecks and ...READ MORE

Apr 7 in Generative AI by puja
302 views
0 votes
1 answer

What certifications do I need to become a Malware Analyst?

Pursuing specialized certifications can significantly enhance your ...READ MORE

Mar 26 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
738 views
+1 vote
2 answers
0 votes
1 answer

Will calling a set state function with the same value using hooks cause a rerender?

No, calling a setState function with the ...READ MORE

Apr 3 in Node-js by anonymous
413 views
0 votes
1 answer

What’s the reasoning behind blocking specific ports like 10080 on internet browsers?

​Browsers block specific ports, such as 10080, ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
370 views
0 votes
1 answer

Does port knocking increase security behind a router?

​Port knocking is a security technique that ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
324 views
0 votes
1 answer

How does dependency determination impact critical path calculations?

Dependencies specify task relationships, and faults in ...READ MORE

Apr 4 in PMP by Naira
319 views
0 votes
0 answers

What is the role of replicated variables in TPU training?

With the help of code can i ...READ MORE

Apr 7 in Generative AI by Nidhi
• 16,260 points
221 views
0 votes
0 answers

What are the benefits of asynchronous execution on TPUs, and how do you enable it?

Can you tell me What are the ...READ MORE

Apr 7 in Generative AI by Ashutosh
• 33,350 points
221 views
0 votes
1 answer

How long does malware last "in the wild"?

​The duration for which malware remains active ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
366 views
+1 vote
1 answer
0 votes
1 answer

How to protect against backdoors in routers?

Protecting your router from backdoors is crucial ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
319 views
0 votes
4 answers

How to print objects of class using print function in Python?

You have to called the built in ...READ MORE

May 12, 2021 in Python by anonymous

edited Mar 5 80,880 views
0 votes
1 answer

How to secure my network and system setup?

Securing your network and system setup is ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
310 views
0 votes
0 answers

How would you use generative AI for customer behavior prediction in e-commerce applications?

Can you tell me How would you ...READ MORE

Apr 4 in Generative AI by Nidhi
• 16,260 points
354 views
0 votes
1 answer

How to customize Autocomplete of MUI, in react?

The following approaches are used to customize ...READ MORE

Apr 2 in Node-js by anonymous
418 views
0 votes
1 answer

What techniques are there for preventing radio-signal replay attacks?

​Replay attacks in wireless communications occur when ...READ MORE

Apr 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
397 views
0 votes
0 answers

How do you manage input partitioning for sequential models on TPUs?

Can i know How do you manage ...READ MORE

Apr 7 in Generative AI by Nidhi
• 16,260 points
207 views
0 votes
1 answer

How is a passkey more secure than the regular email/password with a U2F key?

​Passkeys represent a significant advancement in authentication ...READ MORE

Apr 2 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
394 views
0 votes
1 answer

How do I merge two datasets while ensuring that duplicate rows are handled properly?

To merge two datasets and take care ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
424 views
0 votes
1 answer

How to create a sticky left sidebar menu using bootstrap 3?

To create a sticky left sidebar that ...READ MORE

Apr 4 in Node-js by anonymous
365 views
0 votes
1 answer

How sensitive is information on a system's architecture?

​Exposing details about your system's architecture can ...READ MORE

Apr 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
304 views
0 votes
1 answer

How would you augment a dataset to simulate one-shot scenarios while ensuring the embeddings remain consistent?

To simulate one-shot scenarios while keeping embeddings ...READ MORE

Apr 7 in Generative AI by Anila
277 views
0 votes
0 answers
0 votes
1 answer

How much do penetration tester ethical hackers make?

Penetration testers, commonly known as ethical hackers, ...READ MORE

Mar 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
749 views
0 votes
1 answer

What are the security pros and cons of setting up passkeys for Gmail logins?

​Passkeys are an emerging authentication method designed ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
339 views
0 votes
0 answers

How do generative AI handle rare events in tasks like anomaly detection or fraud detection?

With the help of code can you ...READ MORE

Apr 4 in Generative AI by Ashutosh
• 33,350 points
335 views
0 votes
1 answer

What prevents random software installation popups from misinterpreting our consent?

​Operating systems and security measures employ several ...READ MORE

Apr 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
336 views
0 votes
1 answer

How can I create a measure that returns a dynamic title based on applied filters?

To create a dynamic title in Power ...READ MORE

Apr 1 in Power BI by anonymous
• 36,180 points
410 views
0 votes
1 answer

How to lock cells in excel ?

To make a column non-editable: Select the whole ...READ MORE

Oct 18, 2022 in Others by narikkadan
• 86,360 points
39,145 views
0 votes
1 answer

In what scenarios would a fast-tracking vs. crashing technique be preferable?

Two schedule acceleration techniques, each serving different ...READ MORE

Apr 4 in PMP by Naira
287 views