Trending questions in Edureka Community

0 votes
0 answers
0 votes
0 answers

How to use AI to predict cyber threats using Python?

Machine learning models can analyze network traffic ...READ MORE

Mar 5, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
390 views
0 votes
0 answers

How can you prevent bias amplification in text generation models when using biased data sources?

With the help of code can you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
465 views
0 votes
0 answers

How do you establish accountability within a cross-functional team?

I’m curious about how you make sure ...READ MORE

Mar 3, 2025 in PMP by Parshvi
• 7,940 points
380 views
0 votes
1 answer
0 votes
0 answers

How is salting used to increase the security of a user's stored password?

Salting adds a unique random value to ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
432 views
0 votes
0 answers

Can we apply two pipes together in Angular?

I doubt it. Can we apply two ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
430 views
0 votes
0 answers

How do you perform feature engineering using PolynomialFeatures in Scikit-learn for regression tasks?

With the help of proper code example ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
463 views
0 votes
0 answers

How can I optimize hyperparameters in a lightGBM model for time-series forecasting?

With the help of proper code example ...READ MORE

Feb 22, 2025 in Generative AI by Nidhi
• 16,260 points
740 views
0 votes
0 answers

How do you deal with unexpected changes in client personnel?

I'm working on a project, and one ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
615 views
+1 vote
2 answers

What are some practical examples of how Power BI Copilot can assist with building DAX measures and queries?

Power BI Copilot can make building DAX ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
706 views
0 votes
0 answers

What techniques resolve length truncation issues when generating long-form text using transformers?

Can you tell me What techniques resolve ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
452 views
0 votes
1 answer

How can you log and inspect request and response headers in Angular?

In Angular, you can log request and ...READ MORE

Feb 25, 2025 in Angular by Navya
680 views
0 votes
0 answers
0 votes
0 answers

How is MITRE ATT&CK used?

MITRE ATT&CK is a framework that maps ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
319 views
0 votes
0 answers

What steps would you take if a project sponsor requests a significant change after the project has been initiated?

If a project sponsor asks for a ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
366 views
0 votes
1 answer
+1 vote
1 answer

How can I embed Power BI reports into a Xamarin mobile application?

Embedding Power BI reports into a Xamarin ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
496 views
0 votes
1 answer

What is the use of takeUntil to cancel a subscription?

takeUntil is an RxJS operator used to ...READ MORE

Feb 24, 2025 in Node-js by Navya
705 views
0 votes
0 answers

How do you use SVC with RBF kernel for classification on a non-linear dataset in Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
446 views
0 votes
1 answer

What's the point of salting Double Submit Cookie (CSRF protection)?

The Double Submit Cookie pattern is a ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,402 views
0 votes
0 answers

Can you stop email spoofing?

Email spoofing allows attackers to forge sender ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
314 views
0 votes
0 answers

How can you handle multi-modal input data when training generative models for text and image synthesis?

Can you tell me How can you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
445 views
0 votes
0 answers

How do you prevent output distortion in GPT-2 models when generating technical articles?

With the help of code can i ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
443 views
0 votes
1 answer

How do you use Link and NavLink differently?

Feature <Link> <NavLink> Purpose Used for navigation between routes. Used for navigation ...READ MORE

Feb 24, 2025 in Node-js by Kavya
746 views
0 votes
1 answer

Is there a way to ignore touch events on Text in React Native, or can they be managed differently?

Yes! In React Native, you can ignore ...READ MORE

Feb 22, 2025 in Node-js by Kavya
822 views
0 votes
0 answers

Describe a time when you had to manage a project with an unclear goal. How did you proceed?

Have you ever had to manage a ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
355 views
0 votes
1 answer

How to pass parameters with react-router?

Passing Parameters with React Router 1. Define a ...READ MORE

Feb 23, 2025 in Node-js by Kavya
755 views
0 votes
0 answers

What’s the difference between Observables and Promises?

With the help of an example, can ...READ MORE

Mar 3, 2025 in Angular by Nidhi
• 16,260 points
431 views
0 votes
0 answers

What steps can be taken to fix dead neurons during training of a text generation model?

Can i know What steps can be ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
435 views
0 votes
0 answers

How can you implement Bayesian Ridge regression and visualize the coefficient shrinkage effect in Scikit-learn?

Can i know How can you implement ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
436 views
0 votes
1 answer

What is the difference between Hooks and router in React?

Feature Hooks React Router Definition Functions that manage state and side ...READ MORE

Feb 24, 2025 in Node-js by Kavya
738 views
0 votes
0 answers

How do phishing attacks lead to identity theft?

Phishing attacks trick users into revealing sensitive ...READ MORE

Mar 3, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
402 views
0 votes
0 answers

How does network scanning help in security assessments?

Network scanning is used to identify active ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
574 views
0 votes
0 answers

How do you ensure that all project requirements are gathered and documented effectively?

What’s your process for making sure all ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
348 views
0 votes
0 answers
+1 vote
1 answer
+1 vote
1 answer
0 votes
0 answers

How would you troubleshoot lack of coherence in generated dialogue when using a language model?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
424 views
0 votes
0 answers

How would you deal with multicollinearity using Scikit-learn when training a Linear Regression model?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
425 views
0 votes
1 answer

How do you handle a large amount of data in React?

Handling Large Amounts of Data in React To ...READ MORE

Feb 24, 2025 in Node-js by Kavya
715 views
0 votes
0 answers

What’s your strategy for handling a major data breach during a project?

I'm leading a project, and one of ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
580 views
0 votes
0 answers

How do you manage team expectations if the project scope is reduced?

How do you keep your team motivated ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
553 views
0 votes
1 answer

How can you implement forkJoin for multiple API responses aggregation?

In Angular, forkJoin is used to combine ...READ MORE

Feb 24, 2025 in Node-js by Navya
681 views
0 votes
0 answers

How would you prioritize tasks when faced with limited resources and tight deadlines?

How do you prioritize tasks when you're ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
338 views
0 votes
0 answers

How do DDoS attacks disrupt network services?

DDoS attacks flood a network with traffic, ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
519 views
0 votes
0 answers

How can you fix memory consumption issues in a GPT-based model trained for long-text generation?

Can i know How can you fix ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
418 views
0 votes
1 answer

How can I call an API in Power BI when connected through a VPN?

Challenges When Calling an API via VPN Network ...READ MORE

Feb 27, 2025 in Power BI by anonymous
• 36,180 points
545 views
0 votes
0 answers

How would you handle a situation where the project scope is continuously changing?

How do you handle a situation where ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
334 views