Trending questions in Edureka Community

0 votes
0 answers

How do you create a reusable component in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
313 views
0 votes
1 answer

How to automate a vulnerability assessment lifecycle in Python?

Automating a vulnerability assessment lifecycle using Python ...READ MORE

Feb 19 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
827 views
0 votes
0 answers

How do you address risks when resources are below project requirements?

When you’re working on a project and ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
257 views
0 votes
0 answers

How to detect unauthorized USB device insertion?

Unauthorized USB devices can pose serious security ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
211 views
0 votes
1 answer

How can you preload data for a route in React?

Preloading Data for a Route in React ...READ MORE

Feb 24 in Node-js by Kavya
645 views
0 votes
0 answers

How would you handle a rapid scope expansion by key stakeholders?

What do you do when major stakeholders ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
254 views
0 votes
1 answer

How to cancel HTTP request in Angular 8?

In Angular 8, you can cancel an ...READ MORE

Feb 26 in Angular by Kavya
523 views
+1 vote
1 answer

Is there a way to track and visualize variable name changes within a group in Power BI, and what DAX techniques can help?

Tracking and Visualizing Variable Name Changes in ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
387 views
0 votes
0 answers

What is the first step in using Burp Suite for web application security testing?

Burp Suite is a powerful tool for ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
303 views
0 votes
0 answers

How do you create buy-in for a project facing internal opposition?

I’m curious about how to create buy-in ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
251 views
0 votes
0 answers

How do you prioritize when multiple projects have high ROI potential?

When faced with multiple projects that all ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
250 views
0 votes
1 answer

How to create WordPress themes?

Steps to Create a WordPress Theme Set Up ...READ MORE

Feb 24 in PHP by Kavya
624 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

Why would you use a service in Angular and how is it different from a component?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
299 views
0 votes
0 answers
0 votes
0 answers

What is the difference between dependency injection and service in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
298 views
0 votes
0 answers

How can brute-force attacks compromise password security?

Brute-force attacks systematically try different password combinations ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
300 views
0 votes
1 answer

How do you detect log tampering in a compromised system?

Ensuring the integrity of system logs is ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
729 views
0 votes
0 answers

How is MITRE ATT&CK used?

MITRE ATT&CK is a framework that maps ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
197 views
0 votes
0 answers
0 votes
1 answer

How to Calculate Dynamic Regional Sales Percentage in DAX?

To compute the percentage of total sales ...READ MORE

Mar 3 in Power BI by anonymous
• 36,180 points
278 views
0 votes
0 answers

What’s the difference between authentication and authorization?

Authentication and authorization are key concepts in ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
411 views
0 votes
1 answer

What techniques mitigate catastrophic forgetting in continual Generative AI training?

Techniques like Elastic Weight Consolidation (EWC), Replay ...READ MORE

Mar 17 in Generative AI by dhoni
413 views
0 votes
0 answers

How to encrypt sensitive data using AES in Python?

AES (Advanced Encryption Standard) is widely used ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
287 views
0 votes
0 answers

How do you establish accountability within a cross-functional team?

I’m curious about how you make sure ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
235 views
0 votes
0 answers
+1 vote
1 answer

What are common reasons why DirectQuery fails when publishing to Power BI Service, and how can this be resolved?

When publishing to the Power BI Service, ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
533 views
0 votes
0 answers

How do you use forkJoin() for parallel API calls?

can you explain me with the help ...READ MORE

Mar 5 in Angular by Nidhi
• 16,260 points
236 views
0 votes
0 answers

What’s the difference between SSO and federated identity?

Single Sign-On (SSO) and federated identity both ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
283 views
0 votes
0 answers

Can you stop email spoofing?

Email spoofing allows attackers to forge sender ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
181 views
0 votes
1 answer

What are the steps to create and customize a Waterfall chart in Power BI?

A Waterfall chart in Power BI is useful for ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
395 views
+1 vote
1 answer

What could be causing issues when trying to fetch data from Custom Analytics Views in the Azure DevOps API, and how can I resolve them?

When querying Custom Analytics Views in Azure ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
358 views
0 votes
0 answers

What are common methods of identity theft in networks?

Identity theft occurs when attackers steal personal ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
279 views
0 votes
2 answers

How can Power BI Fabric integrate with other Microsoft tools (like Excel or Teams) to enhance narrative delivery?

When blended with Microsoft tools like Excel ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6 598 views
+1 vote
1 answer

How do I prevent my app from redirecting to Power BI when embedding a protected report in a React application?

To ensure that your React app will ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
357 views
0 votes
0 answers

Describe a time when you had to manage a project with an unclear goal. How did you proceed?

Have you ever had to manage a ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
224 views
0 votes
0 answers
0 votes
0 answers

How do Identity and Access Management (IAM) systems work?

Identity and Access Management (IAM) systems control ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
275 views
0 votes
0 answers

How do you deal with unexpected changes in client personnel?

I'm working on a project, and one ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
462 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How to use AI to predict cyber threats using Python?

Machine learning models can analyze network traffic ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
226 views
0 votes
0 answers

How can we protect against packet sniffing?

Packet sniffing allows attackers to capture and ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
401 views
0 votes
1 answer

What is the use case of custom directives in Angular?

Custom directives are used to encapsulate reusable ...READ MORE

Feb 26 in Angular by Tanya
484 views
0 votes
0 answers

Which improvements does IPv6 provide over the current IP addressing scheme?

IPv6 was introduced to overcome the limitations ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
441 views
0 votes
0 answers
+1 vote
2 answers

How does the Copilot feature in Power BI improve report creation and data analysis workflows for business users?

The Copilot Feature Improves the Entire Workflow ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
545 views