Trending questions in Edureka Community

0 votes
0 answers

How do you ensure alignment between business and project objectives?

I’ve seen projects that seem like a ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
283 views
0 votes
0 answers

What security measures protect against MITM attacks?

Man-in-the-Middle (MITM) attacks allow attackers to intercept ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
292 views
0 votes
1 answer

How do I ignore hidden files in Linux?

In Linux, hidden files and directories are ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
593 views
+1 vote
2 answers

How do I incorporate storytelling techniques into a Power BI Fabric report to make data more engaging for non-technical audiences?

Three essential roles will be essential in ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
441 views
0 votes
1 answer

How can you implement forkJoin for multiple API responses aggregation?

In Angular, forkJoin is used to combine ...READ MORE

Feb 24 in Node-js by Navya
451 views
0 votes
1 answer

What is the best way to trigger change or input event in react js?

To handle change or input events in ...READ MORE

Feb 22 in Node-js by Kavya
571 views
0 votes
0 answers

How would you handle a sudden rise in project costs due to market changes?

You planned the budget carefully, but then ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
279 views
0 votes
0 answers

What’s the impact of network enumeration on cybersecurity?

Network enumeration can be used by both ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
288 views
0 votes
1 answer

How to use ngIf with else?

You can use *ngIf with else to ...READ MORE

Feb 26 in Node-js by Navya
370 views
0 votes
0 answers

What are the best practices for access control policies?

Effective access control policies ensure that only ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
275 views
0 votes
0 answers

How would you proceed if you identify a skills gap too late in a project?

You’re deep into a project, and suddenly ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
275 views
+1 vote
1 answer

What are the recommended ways to transfer data from Power BI to DOMO while maintaining performance and data integrity?

There are approaches to efficiently performing the ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
402 views
0 votes
0 answers

How do you handle team burnout in fast-paced project cycles?

How do you manage team burnout when ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
355 views
0 votes
0 answers

What is the impact of momentum in Keras optimizers for model convergence?

Can you tell me What is the ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
409 views
0 votes
0 answers

How do you determine key metrics for non-traditional project success?

How do you measure success for projects ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
304 views
0 votes
1 answer

What methods are available to force a component to re-render when using React hooks?

Here are the primary methods available to ...READ MORE

Feb 23 in Node-js by Kavya
510 views
0 votes
1 answer

How would you manage the state between different components of the site?

Method Description Best For Props (Parent to Child) Pass data from ...READ MORE

Feb 24 in Node-js by Kavya
474 views
+1 vote
1 answer

How can I optimize Power BI performance when working with an SSAS Multidimensional Cube?

Thus, all performance improvements for Power BI ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
386 views
0 votes
0 answers

How do you approach project decisions when ROI is difficult to quantify?

Some projects—especially things like innovation or process ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
258 views
0 votes
0 answers

How does the use of hashed passwords keep data more secure?

Hashing transforms passwords into fixed-length values, making ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
257 views
0 votes
1 answer

How do you implement breadcrumbs in a React-Router app?

Breadcrumbs help users navigate by showing the ...READ MORE

Feb 24 in Node-js by Kavya
459 views
+1 vote
2 answers

Can you use Power BI Fabric to create dynamic, personalized narratives based on user roles or preferences?

Power BI Fabric makes it possible to ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
415 views
0 votes
0 answers

What's your approach to managing multiple projects with overlapping deadlines?

How do you manage multiple projects with ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
381 views
0 votes
0 answers

How do I optimize the batch size for a VAE model to achieve faster convergence with balanced accuracy?

With the help of proper code example ...READ MORE

Feb 22 in Generative AI by Nidhi
• 16,260 points
441 views
0 votes
0 answers
0 votes
0 answers

How would you approach the unexpected introduction of a competitor product?

I'm working on a project, and out ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
319 views
0 votes
1 answer

Which of the following method is used for cross-domain Ajax calls?

The correct method used for cross-domain Ajax ...READ MORE

Feb 26 in Angular by Kavya
342 views
0 votes
0 answers

How do you manage knowledge sharing in a diverse, cross-functional team?

When you’re working with people from different ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
246 views
0 votes
0 answers

How do you handle communication issues with an international team?

I’m working with an international team, and ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
289 views
0 votes
1 answer

Should I use map or switchmap when using angular http module?

When working with the Angular HTTP module, ...READ MORE

Feb 24 in Angular by Navya
415 views
0 votes
0 answers

How do you defend against DDoS attacks?

DDoS attacks overload a network or service ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
254 views
0 votes
0 answers

How do I use Keras to train a Bidirectional LSTM model for sentence classification?

With the help of code can you ...READ MORE

Feb 24 in Generative AI by Vani
• 3,580 points
371 views
0 votes
0 answers

How do you manage critical interdependencies in complex projects?

I’m working on a complex project where ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
287 views
0 votes
0 answers

How do I utilize Keras Callbacks to implement early stopping during model training?

With the help of python programming can ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
390 views
0 votes
0 answers

What’s your approach to handling project setbacks caused by miscommunication?

How do you deal with project delays ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
281 views
0 votes
0 answers

How does OAuth 2.0 manage access in web applications?

OAuth 2.0 is widely used for secure ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
239 views
0 votes
0 answers

How do you handle conflicting stakeholder feedback on deliverables?

I'm currently working on a project where ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
307 views
0 votes
1 answer

What’s your approach when a project’s risk increases unexpectedly?

When there are sudden problems in a ...READ MORE

Feb 27 in PMP by Naira
305 views
0 votes
1 answer

How does BehaviorSubject differ from Subject in state management?

Feature Subject BehaviorSubject Initial Value No initial value Requires an initial value Last ...READ MORE

Feb 24 in Node-js by Navya
407 views
0 votes
1 answer

How to set read concern in MongoDB?

In MongoDB, you can set read concern ...READ MORE

Feb 23 in Node-js by Kavya
464 views
0 votes
1 answer

Can we create a custom directive in Angular?

You can create a custom directive in ...READ MORE

Feb 26 in Angular by Tanya
328 views
0 votes
1 answer

How to run a scan equivalent to nmap vulnerabilities scan?

Nmap is a versatile network scanning tool ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
545 views
0 votes
0 answers

How do I implement a CNN-LSTM hybrid model for video classification tasks?

Can you tell me How do I ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
381 views
0 votes
1 answer

How do you integrate authentication with React-Router?

To integrate authentication with React Router, follow ...READ MORE

Feb 24 in Node-js by Kavya
435 views
0 votes
1 answer

What is the default response type of HttpClient service?

By default, HttpClient assumes the server response ...READ MORE

Feb 25 in Node-js by Navya
370 views
0 votes
1 answer

What is the purpose of anti-rollback protection in IoT devices?

Anti-rollback protection is a security feature in ...READ MORE

Feb 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
715 views
0 votes
0 answers

What’s your method for quickly evaluating vendor reliability?

How do you quickly figure out if ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
272 views
0 votes
0 answers
+1 vote
1 answer

Why do Power BI visuals created using Python scripts sometimes appear misaligned, and how can this be fixed?

So, while writing a Python script to ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
357 views
0 votes
0 answers

How do you keep the team focused if they lack interest in the project topic?

I've been in situations where the team ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
355 views