Trending questions in Edureka Community

0 votes
0 answers

How can brute-force attacks compromise password security?

Brute-force attacks systematically try different password combinations ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
256 views
0 votes
0 answers
0 votes
0 answers

Can you explain memory leaks?

With the help of an example and ...READ MORE

Mar 5 in Angular by Nidhi
• 16,260 points
166 views
+1 vote
2 answers

Does Power BI's Copilot feature offer any natural language processing capabilities to create reports using voice commands?

Natural Language Processing is something that the ...READ MORE

Jan 3 in Power BI by pooja
• 24,450 points
389 views
0 votes
0 answers
0 votes
0 answers

Why would you use a service in Angular and how is it different from a component?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
249 views
+1 vote
1 answer

How can OData be efficiently used in Power BI for connecting to and managing data sources?

Using OData Efficiently in Power BI for ...READ MORE

Feb 27 in Power BI by anonymous
• 36,180 points
367 views
0 votes
0 answers

Can you stop email spoofing?

Email spoofing allows attackers to forge sender ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
145 views
0 votes
0 answers

How do you establish accountability within a cross-functional team?

I’m curious about how you make sure ...READ MORE

Mar 3 in PMP by Parshvi
• 7,940 points
190 views
0 votes
1 answer

How to Calculate Dynamic Regional Sales Percentage in DAX?

To compute the percentage of total sales ...READ MORE

Mar 3 in Power BI by anonymous
• 36,180 points
230 views
0 votes
0 answers

Describe a time when you had to manage a project with an unclear goal. How did you proceed?

Have you ever had to manage a ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
191 views
0 votes
0 answers

What’s the difference between authentication and authorization?

Authentication and authorization are key concepts in ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
363 views
0 votes
0 answers

What is the difference between dependency injection and service in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
241 views
+1 vote
1 answer

What are the steps to import a SQL Server .BAK backup file into Power BI?

Power BI does not directly support importing ...READ MORE

Feb 27 in Power BI by anonymous
• 36,180 points
424 views
+1 vote
1 answer

What is the Tandem Power BI Connector, and how can it be configured effectively?

The Tandem Power BI Connector is a ...READ MORE

Feb 27 in Power BI by anonymous
• 36,180 points
359 views
0 votes
0 answers

What is the first step in using Burp Suite for web application security testing?

Burp Suite is a powerful tool for ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
238 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How to use AI to predict cyber threats using Python?

Machine learning models can analyze network traffic ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
190 views
0 votes
0 answers

What are common methods of identity theft in networks?

Identity theft occurs when attackers steal personal ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
233 views
0 votes
1 answer

What techniques mitigate catastrophic forgetting in continual Generative AI training?

Techniques like Elastic Weight Consolidation (EWC), Replay ...READ MORE

Mar 17 in Generative AI by dhoni
354 views
0 votes
0 answers

How do you use forkJoin() for parallel API calls?

can you explain me with the help ...READ MORE

Mar 5 in Angular by Nidhi
• 16,260 points
182 views
0 votes
1 answer

How to cancel HTTP request in Angular 8?

In Angular 8, you can cancel an ...READ MORE

Feb 26 in Angular by Kavya
439 views
0 votes
0 answers
0 votes
0 answers

What’s the difference between SSO and federated identity?

Single Sign-On (SSO) and federated identity both ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
224 views
0 votes
0 answers

How to encrypt sensitive data using AES in Python?

AES (Advanced Encryption Standard) is widely used ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
220 views
0 votes
1 answer

What are the steps to create and customize a Waterfall chart in Power BI?

A Waterfall chart in Power BI is useful for ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
338 views
+1 vote
1 answer

Is there a way to track and visualize variable name changes within a group in Power BI, and what DAX techniques can help?

Tracking and Visualizing Variable Name Changes in ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
302 views
0 votes
0 answers
0 votes
0 answers

How do you ensure that all project requirements are gathered and documented effectively?

What’s your process for making sure all ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
167 views
0 votes
0 answers
0 votes
0 answers

What are examples of TCP and UDP in real-life scenarios?

TCP and UDP are widely used in ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
390 views
0 votes
0 answers
0 votes
0 answers

How would you prioritize tasks when faced with limited resources and tight deadlines?

How do you prioritize tasks when you're ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
163 views
0 votes
0 answers
0 votes
0 answers

What techniques resolve length truncation issues when generating long-form text using transformers?

Can you tell me What techniques resolve ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,260 points
243 views
0 votes
0 answers

How would you handle a situation where the project scope is continuously changing?

How do you handle a situation where ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
161 views
0 votes
0 answers

How do you deal with unexpected changes in client personnel?

I'm working on a project, and one ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
401 views
0 votes
1 answer

What is the use case of custom directives in Angular?

Custom directives are used to encapsulate reusable ...READ MORE

Feb 26 in Angular by Tanya
426 views
+1 vote
1 answer

How do I prevent my app from redirecting to Power BI when embedding a protected report in a React application?

To ensure that your React app will ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
291 views
0 votes
0 answers

How is salting used to increase the security of a user's stored password?

Salting adds a unique random value to ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
211 views
0 votes
0 answers

Which improvements does IPv6 provide over the current IP addressing scheme?

IPv6 was introduced to overcome the limitations ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
384 views
+1 vote
1 answer

What could be causing issues when trying to fetch data from Custom Analytics Views in the Azure DevOps API, and how can I resolve them?

When querying Custom Analytics Views in Azure ...READ MORE

Feb 28 in Power BI by anonymous
• 36,180 points
288 views
0 votes
0 answers
0 votes
0 answers

Can we apply two pipes together in Angular?

I doubt it. Can we apply two ...READ MORE

Mar 3 in Angular by Nidhi
• 16,260 points
205 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How would you troubleshoot lack of coherence in generated dialogue when using a language model?

Can you tell me How would you ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,260 points
232 views
0 votes
0 answers