Trending questions in Edureka Community

0 votes
1 answer

How can I create a dynamic date range filter that automatically adjusts based on user-selected slicer values?

To create a dynamic date range filter ...READ MORE

Mar 7 in Power BI by anonymous
• 36,180 points
390 views
0 votes
0 answers

Describe a time when you had to negotiate project terms with a difficult stakeholder.

Can you share a time when you ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
180 views
0 votes
0 answers

How do you manage stakeholder expectations when project delays are unavoidable?

How do you set realistic stakeholder expectations ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
172 views
0 votes
1 answer
0 votes
0 answers

What’s the importance of sshd’s setting RekeyLimit?

The RekeyLimit setting in SSH controls how ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
217 views
0 votes
0 answers

How does an attacker exploit SNMP v1 for enumeration?

SNMP v1 lacks strong security mechanisms, making ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
220 views
0 votes
0 answers

How does VoIP war dialing help in VoIP enumeration?

VoIP war dialing is used to scan ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
216 views
0 votes
1 answer

How to lock cells in excel ?

To make a column non-editable: Select the whole ...READ MORE

Oct 18, 2022 in Others by narikkadan
• 86,360 points
38,047 views
0 votes
0 answers

Describe your approach to tracking project expenses.

How do you keep track of project ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
169 views
0 votes
1 answer

Python3 will not import file "apikey.py"

Ensure the file apikey.py is in the ...READ MORE

Mar 11 in Generative AI by hommie
226 views
0 votes
0 answers

How do you prioritize stakeholder needs when resources are limited?

When resources are tight, how do you ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
176 views
0 votes
1 answer

HuggingFace tokens for 'model garden' not valid in Google console

Ensure your Hugging Face access token has ...READ MORE

Mar 11 in Generative AI by MLmadhav
225 views
0 votes
1 answer
0 votes
1 answer

How do you resolve repetitive token generation in language models for creative writing?

Use techniques like top-k sampling, top-p (nucleus) ...READ MORE

Mar 11 in Generative AI by minato
223 views
0 votes
0 answers

Why is the bin folder missing after installing MongoDB on Windows 7 64-bit?

Can someone exlpain me with the code ...READ MORE

Mar 6 in Node-js by Nidhi
• 16,260 points
437 views
0 votes
0 answers

What steps would you take if a key stakeholder is unresponsive?

How would you deal with a key ...READ MORE

Mar 11 in PMP by Parshvi
• 7,940 points
250 views
0 votes
0 answers

Describe your approach to managing stakeholders with conflicting interests.

How do you handle situations where different ...READ MORE

Mar 11 in PMP by Parshvi
• 7,940 points
250 views
0 votes
0 answers

How would you handle a situation where the project deliverables do not meet quality standards?

What would you do if the final ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
161 views
0 votes
1 answer

How can I optimize a SUMX() function that is performing poorly on large datasets?

To optimize a SUMX() function for large ...READ MORE

Mar 10 in Power BI by anonymous
• 36,180 points
259 views
0 votes
1 answer

How do you use L1 regularization with Logistic Regression in Scikit-learn for feature selection?

You can use L1 regularization with LogisticRegression ...READ MORE

Mar 18 in Generative AI by anonymous
• 33,350 points
249 views
0 votes
0 answers

How do you handle a situation where quality requirements conflict with project constraints?

How do you handle situations where strict ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
155 views
+1 vote
1 answer

What are the different ways to integrate Bloomberg data into Power BI, and what challenges should I expect?

Integrating Bloomberg financial data into Power BI ...READ MORE

Feb 27 in Power BI by anonymous
• 36,180 points
742 views
0 votes
0 answers

What are the impacts of incorrect VPN configurations?

Misconfigured VPNs can lead to security vulnerabilities, ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
202 views
0 votes
1 answer

Convert openAi functions to gemini function calling

You can convert the chatbot from NLTK-based functions ...READ MORE

Mar 11 in Generative AI by minnano nihongo
212 views
0 votes
0 answers

Describe a time when you had to manage a project with stringent quality standards.

Can you share an experience where you ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
149 views
0 votes
0 answers

How do you ensure that all team members adhere to quality processes?

How do you make sure every team ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
148 views
+1 vote
2 answers

What is the correct syntax for using the RELATED() function within an IF condition in Power BI?

The correct syntax for using the RELATED() ...READ MORE

Jan 23 in Power BI by pooja
• 24,450 points
357 views
0 votes
0 answers

What steps do you take to ensure continuous improvement in project processes?

What steps do you take to continuously ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
149 views
+1 vote
2 answers

How can I retrieve a mapped value from a many-to-one related table in Power BI when using DirectQuery mode?

Get the associated values per multiple linked ...READ MORE

Jan 23 in Power BI by pooja
• 24,450 points
355 views
0 votes
1 answer

How to fix Service Unavailable error?

Steps to Fix "Service Unavailable" Error Check Server ...READ MORE

Mar 10 in Node-js by Tanvi
246 views
0 votes
1 answer

How to Handle Blocking Threads in a Ruby Chat Server for Server Commands?

To handle blocking threads in a Ruby ...READ MORE

Mar 10 in Node-js by Tanvi
246 views
0 votes
0 answers

Which option can be used to authenticate the IPsec peers during IKE Phase 1?

IKE Phase 1 establishes a secure connection ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
191 views
0 votes
1 answer

How to Make a Resizable JavaFX Application with Font and Image Size Constraints?

To create a resizable JavaFX application with ...READ MORE

Mar 10 in Java-Script by Tanvi
240 views
0 votes
0 answers

What strategies do you use to build trust with stakeholders?

What are your go-to strategies for building ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
146 views
0 votes
1 answer

What solutions can reduce training time for large-scale generative models without compromising output quality?

Use techniques like mixed precision training, gradient ...READ MORE

Mar 11 in Generative AI by anupam mishra
195 views
0 votes
1 answer

Your Power BI dataset has millions of rows and is causing memory issues. How can you reduce the dataset size without losing key insights?

Here are a few cutting-edge optimization techniques ...READ MORE

Mar 7 in Power BI by anonymous
• 36,180 points
353 views
0 votes
0 answers

What strategies do you use to identify and address quality issues proactively?

What’s your strategy for spotting and fixing ...READ MORE

Mar 13 in PMP by Parshvi
• 7,940 points
128 views
0 votes
1 answer

What are the Typescript types for React checkbox events and handlers, or how do I define them?

In TypeScript, handling checkbox events in React ...READ MORE

Feb 22 in Node-js by Kavya
942 views
0 votes
0 answers

What types of attacks and abuse does DNSSEC protect against?

DNSSEC adds cryptographic security to DNS to ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
166 views
+1 vote
2 answers
0 votes
0 answers

How does LDAP anonymous binding expose user data?

LDAP anonymous binding allows unrestricted access to ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
168 views
0 votes
0 answers

How to find the IP address of the DNS server in Wireshark?

Wireshark is a powerful network analysis tool. ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
243 views
0 votes
0 answers

How does DNS Cache Snooping reveal internal domains?

DNS Cache Snooping allows attackers to check ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
160 views
0 votes
0 answers

What are the risks of LDAP injection in AD environments?

LDAP injection can allow attackers to manipulate ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
163 views
0 votes
1 answer

Cannot find name webgl object TypeScript issue TS2304.

The error Cannot find name 'WebGLObject'. TS2304 ...READ MORE

Mar 6 in Angular by Anvi
385 views
0 votes
4 answers

How to print objects of class using print function in Python?

You have to called the built in ...READ MORE

May 12, 2021 in Python by anonymous

edited Mar 5 79,690 views
0 votes
0 answers

What is the impact of NetBIOS null session in hacking?

NetBIOS null sessions allow unauthorized access to ...READ MORE

Mar 10 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
235 views
0 votes
0 answers

How do attackers enumerate NFS exports on a network?

NFS (Network File System) can expose shared ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
152 views
0 votes
0 answers

What was/is the purpose of the MONLIST command in NTP?

The MONLIST command in older NTP versions provided ...READ MORE

Mar 12 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
151 views