Trending questions in Edureka Community

0 votes
0 answers

What can you do to improve output fluency when generating text summaries with a language model?

Can i know What can you do ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
591 views
0 votes
0 answers

How do you create a reusable component in Angular?

Can you explain with an example that ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
558 views
0 votes
0 answers

What are the legal regulations for data protection in networks?

Data protection laws ensure privacy and security ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
510 views
0 votes
0 answers

Describe a time when you had to lead a team through a significant change. How did you manage it?

What steps do you take to manage ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
414 views
0 votes
0 answers

How do you quickly deploy a honeypot with Kali Linux?

A honeypot is a security mechanism designed ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
457 views
0 votes
1 answer

How to handle duplicate records in MongoDB?

Handling duplicate records in MongoDB depends on ...READ MORE

Feb 23, 2025 in Node-js by Kavya
932 views
0 votes
0 answers

How do you prioritize risks in a project with multiple high-impact potential issues?

If a project has multiple high-impact risks, ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
412 views
0 votes
1 answer

How do you choose the root node while constructing a decision tree?

Selecting the root node in a decision ...READ MORE

Feb 25, 2025 in Node-js by Navya
813 views
+1 vote
2 answers

How does the Copilot feature in Power BI improve report creation and data analysis workflows for business users?

The Copilot Feature Improves the Entire Workflow ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
832 views
0 votes
0 answers

Can cybersecurity be automated by AI?

AI is increasingly being integrated into cybersecurity ...READ MORE

Mar 5, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
464 views
0 votes
0 answers

How do you deal with errors in Observables?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
535 views
0 votes
0 answers

What’s your approach to meeting a sudden reduction in project timeline?

If the project timeline gets cut short ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
494 views
0 votes
0 answers

What ways can be used to protect from credential stuffing and automated attacks?

Credential stuffing and automated attacks exploit reused ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
497 views
0 votes
0 answers

What’s the difference between authentication and authorization?

Authentication and authorization are key concepts in ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
666 views
+1 vote
1 answer

What are the recommended ways to transfer data from Power BI to DOMO while maintaining performance and data integrity?

There are approaches to efficiently performing the ...READ MORE

Feb 24, 2025 in Power BI by anonymous
• 36,180 points
793 views
0 votes
0 answers

How do Identity and Access Management (IAM) systems work?

Identity and Access Management (IAM) systems control ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
545 views
0 votes
0 answers

Describe a time when you failed to identify a critical risk. How did you handle the situation?

Have you ever missed a major risk ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
399 views
0 votes
2 answers

How do I manage Power BI authentication using OAuth 2.0 in enterprise environments?

Use Azure AD to register an application, ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,223 views
0 votes
0 answers

How to detect log-based anomalies using Python?

Analyzing logs can help detect unusual activity ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
441 views
0 votes
0 answers
0 votes
0 answers

How can I optimize hyperparameters in a lightGBM model for time-series forecasting?

With the help of proper code example ...READ MORE

Feb 22, 2025 in Generative AI by Nidhi
• 16,260 points
849 views
0 votes
0 answers

How do you approach risk identification during the planning phase?

What's your process for spotting potential risks ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
398 views
0 votes
0 answers

How to lazy load module after api response in angular?

Can someone exlpain me with the code ...READ MORE

Mar 6, 2025 in Angular by Nidhi
• 16,260 points
446 views
0 votes
0 answers

What is the difference between dependency injection and service in Angular?

Can you explain with an example that ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
534 views
+1 vote
1 answer

What could be causing issues when trying to fetch data from Custom Analytics Views in the Azure DevOps API, and how can I resolve them?

When querying Custom Analytics Views in Azure ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
614 views
+1 vote
1 answer

Power BI Retention Policy – How to Implement FIFO? – What’s the best way to set up a basic FIFO (First-In-First-Out) retention policy in Power BI?

Implementing a FIFO (First In, First Out) ...READ MORE

Feb 18, 2025 in Power BI by anonymous
• 36,180 points
1,041 views
0 votes
0 answers

How do pipes transform data dynamically in Angular?

Can you help me with a code ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
529 views
0 votes
0 answers

How do you manage differing levels of project experience within a team?

I’m wondering how to manage a team ...READ MORE

Mar 4, 2025 in PMP by Parshvi
• 7,940 points
456 views
0 votes
0 answers

Can you explain memory leaks?

With the help of an example and ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
441 views
0 votes
0 answers

How can brute-force attacks compromise password security?

Brute-force attacks systematically try different password combinations ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
529 views
0 votes
0 answers

How do you address risks when resources are below project requirements?

When you’re working on a project and ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
473 views
0 votes
0 answers

Describe your approach to managing a remote project team.

What’s your strategy for managing a remote ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
383 views
0 votes
0 answers

How to encrypt sensitive data using AES in Python?

AES (Advanced Encryption Standard) is widely used ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
522 views
0 votes
0 answers

Should pipes implement PipeTransform interface?

Can you help me with a code ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
524 views
0 votes
0 answers

How would you manage a team member who is consistently underperforming?

How would you handle a team member ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
383 views
+1 vote
1 answer
0 votes
0 answers

How do you prioritize when multiple projects have high ROI potential?

When faced with multiple projects that all ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
464 views
0 votes
0 answers

How would you handle a situation where an identified risk becomes a reality?

If a risk you planned for actually ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
373 views
0 votes
1 answer

How can you implement forkJoin for multiple API responses aggregation?

In Angular, forkJoin is used to combine ...READ MORE

Feb 24, 2025 in Node-js by Navya
807 views
0 votes
0 answers

How do I utilize Keras Callbacks to implement early stopping during model training?

With the help of python programming can ...READ MORE

Feb 24, 2025 in Generative AI by Ashutosh
• 33,350 points
783 views
0 votes
1 answer

What is the use case of custom directives in Angular?

Custom directives are used to encapsulate reusable ...READ MORE

Feb 26, 2025 in Angular by Tanya
728 views
0 votes
0 answers

What methods can you apply to fix contextual drift in language models during dialogue generation?

With the help of code can i ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
541 views
0 votes
0 answers

What’s the difference between SSO and federated identity?

Single Sign-On (SSO) and federated identity both ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
511 views
0 votes
0 answers
+1 vote
2 answers

How does Power BI Fabric enhance the presentation of insights compared to traditional Power BI dashboards and reports?

Power BI Fabric presents an enhanced experience ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6, 2025 790 views
0 votes
0 answers
0 votes
0 answers

How do you use forkJoin() for parallel API calls?

can you explain me with the help ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
461 views
0 votes
1 answer

What is the use of takeUntil to cancel a subscription?

takeUntil is an RxJS operator used to ...READ MORE

Feb 24, 2025 in Node-js by Navya
799 views