Trending questions in Edureka Community

0 votes
0 answers

What’s the difference between authentication and authorization?

Authentication and authorization are key concepts in ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
609 views
0 votes
0 answers

How to lazy load module after api response in angular?

Can someone exlpain me with the code ...READ MORE

Mar 6, 2025 in Angular by Nidhi
• 16,260 points
398 views
0 votes
0 answers

How would you manage a team member who is consistently underperforming?

How would you handle a team member ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
349 views
0 votes
0 answers

How is enumeration used to gather information about a target?

Enumeration is a process used in cybersecurity ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
617 views
0 votes
1 answer

How do you handle scroll restoration in a React-Router app?

By default, React Router does not restore ...READ MORE

Feb 24, 2025 in Node-js by Kavya
808 views
0 votes
0 answers

What is the difference between dependency injection and service in Angular?

Can you explain with an example that ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
484 views
0 votes
0 answers

Can you explain memory leaks?

With the help of an example and ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
396 views
0 votes
0 answers

How do pipes transform data dynamically in Angular?

Can you help me with a code ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
482 views
+1 vote
2 answers

How does the Copilot feature in Power BI improve report creation and data analysis workflows for business users?

The Copilot Feature Improves the Entire Workflow ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
761 views
0 votes
0 answers

How do you address risks when resources are below project requirements?

When you’re working on a project and ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
422 views
0 votes
0 answers

How to encrypt sensitive data using AES in Python?

AES (Advanced Encryption Standard) is widely used ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
473 views
+1 vote
1 answer

What could be causing issues when trying to fetch data from Custom Analytics Views in the Azure DevOps API, and how can I resolve them?

When querying Custom Analytics Views in Azure ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
554 views
0 votes
1 answer

What methods are available to force a component to re-render when using React hooks?

Here are the primary methods available to ...READ MORE

Feb 23, 2025 in Node-js by Kavya
841 views
0 votes
0 answers

How can brute-force attacks compromise password security?

Brute-force attacks systematically try different password combinations ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
473 views
0 votes
0 answers

How would you handle a situation where an identified risk becomes a reality?

If a risk you planned for actually ...READ MORE

Mar 7, 2025 in PMP by Parshvi
• 7,940 points
327 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How can you address token misalignment when using pre-trained models for machine translation?

Can you tell me How can you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
497 views
0 votes
0 answers

Should pipes implement PipeTransform interface?

Can you help me with a code ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
465 views
0 votes
0 answers

How do you prioritize when multiple projects have high ROI potential?

When faced with multiple projects that all ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
410 views
0 votes
2 answers

How can I ensure the data types in Power Query are maintained when moving to the Power BI Data Model?

Ensure data type consistency by explicitly setting ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,145 views
0 votes
0 answers

How do you fix token prediction anomalies during the training phase of a text-to-image generator?

Can i know How do you fix ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
493 views
0 votes
0 answers

What is the first step in using Burp Suite for web application security testing?

Burp Suite is a powerful tool for ...READ MORE

Mar 4, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
460 views
0 votes
0 answers

How do you use forkJoin() for parallel API calls?

can you explain me with the help ...READ MORE

Mar 5, 2025 in Angular by Nidhi
• 16,260 points
415 views
0 votes
0 answers

What are common methods of identity theft in networks?

Identity theft occurs when attackers steal personal ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
462 views
0 votes
0 answers

How do you use DecisionTreeClassifier and visualize the decision tree using Scikit-learn’s plot_tree?

With the help of proper code can ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
490 views
0 votes
0 answers

What’s your approach to managing remote teams with limited oversight?

I’m curious about how people manage remote ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
403 views
0 votes
0 answers

What’s the difference between SSO and federated identity?

Single Sign-On (SSO) and federated identity both ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
458 views
0 votes
0 answers

Describe your approach to defining project scope when requirements are not clearly outlined.

When the project requirements aren’t clear from ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
405 views
0 votes
0 answers

How do you create buy-in for a project facing internal opposition?

I’m curious about how to create buy-in ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
402 views
0 votes
0 answers

What methods can you apply to fix contextual drift in language models during dialogue generation?

With the help of code can i ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
486 views
0 votes
0 answers
0 votes
0 answers

How would you address language ambiguity in generated text using a language model for content generation?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
484 views
0 votes
1 answer

What is the use case of custom directives in Angular?

Custom directives are used to encapsulate reusable ...READ MORE

Feb 26, 2025 in Angular by Tanya
666 views
0 votes
0 answers

How would you handle a rapid scope expansion by key stakeholders?

What do you do when major stakeholders ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
397 views
0 votes
2 answers

How can you implement proper indentation in a Power BI matrix report?

To implement proper indentation in a Power ...READ MORE

Apr 1, 2025 in Power BI by anonymous
• 24,450 points
1,420 views
0 votes
0 answers

How do you evaluate the AUC-ROC curve for a binary classification model in Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
478 views
0 votes
1 answer

How to get select2 selected value in Jquery ?

The third parameter of the new Option ...READ MORE

May 30, 2022 in Java by gaurav
• 23,580 points
44,055 views
0 votes
0 answers

How to detect unauthorized USB device insertion?

Unauthorized USB devices can pose serious security ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
345 views
+1 vote
2 answers

What tools and features in Power BI Fabric are best suited for visualizing time-series data in a narrative context?

Visual solids: An effective visual would be ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6, 2025 725 views
+1 vote
2 answers

How does Power BI Fabric enhance the presentation of insights compared to traditional Power BI dashboards and reports?

Power BI Fabric presents an enhanced experience ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points

edited Mar 6, 2025 725 views
0 votes
1 answer

How to preload a component in Angular?

In Angular, components are not preloaded directly, ...READ MORE

Feb 24, 2025 in Angular by Navya
734 views
0 votes
0 answers

How would you address tokenization errors in a GPT-3 model when generating natural language text?

With the help of code can you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
473 views
0 votes
0 answers

Which improvements does IPv6 provide over the current IP addressing scheme?

IPv6 was introduced to overcome the limitations ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
616 views
0 votes
1 answer

How do you handle nested dynamic routes with React-Router?

Handling Nested Dynamic Routes in React Router ...READ MORE

Feb 24, 2025 in Node-js by Kavya
776 views
+1 vote
1 answer

What are the recommended ways to transfer data from Power BI to DOMO while maintaining performance and data integrity?

There are approaches to efficiently performing the ...READ MORE

Feb 24, 2025 in Power BI by anonymous
• 36,180 points
687 views
0 votes
0 answers

How does a password manager increase security?

Password managers store and generate strong, unique ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
439 views
0 votes
1 answer

How do you create protected routes in React?

Creating Protected Routes in React (React Router ...READ MORE

Feb 23, 2025 in Node-js by Kavya
787 views
0 votes
0 answers

How do you implement K-means++ initialization in KMeans clustering using Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
469 views