Trending questions in Edureka Community

0 votes
0 answers

What’s your approach to handling project setbacks caused by miscommunication?

How do you deal with project delays ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
245 views
0 votes
0 answers

How does the use of hashed passwords keep data more secure?

Hashing transforms passwords into fixed-length values, making ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
203 views
0 votes
1 answer

How do you implement breadcrumbs in a React-Router app?

Breadcrumbs help users navigate by showing the ...READ MORE

Feb 24 in Node-js by Kavya
405 views
+1 vote
1 answer

What are the recommended ways to transfer data from Power BI to DOMO while maintaining performance and data integrity?

There are approaches to efficiently performing the ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
330 views
0 votes
0 answers

How do I use Keras to train a Bidirectional LSTM model for sentence classification?

With the help of code can you ...READ MORE

Feb 24 in Generative AI by Vani
• 3,580 points
329 views
0 votes
1 answer

How would you implement routing in a dynamic Music Store application?

Implementing Routing in a Dynamic Music Store ...READ MORE

Feb 23 in Node-js by Kavya
427 views
+1 vote
2 answers

Can you use Power BI Fabric to create dynamic, personalized narratives based on user roles or preferences?

Power BI Fabric makes it possible to ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
357 views
0 votes
0 answers

How does OAuth 2.0 manage access in web applications?

OAuth 2.0 is widely used for secure ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
196 views
0 votes
1 answer

How can you configure routing for a multi-page React application using React-Router?

To configure routing for a multi-page React ...READ MORE

Feb 23 in Node-js by Kavya
426 views
0 votes
1 answer

How to exploit LFI to retrieve sensitive files in NGINX?

Local File Inclusion (LFI) vulnerabilities occur when ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
508 views
0 votes
1 answer

What’s your approach when a project’s risk increases unexpectedly?

When there are sudden problems in a ...READ MORE

Feb 27 in PMP by Naira
263 views
+1 vote
1 answer

What are the best practices for using Power BI connectors to monitor user activities and interactions within a dashboard?

Power BI dashboards. Some best practices for ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
317 views
0 votes
1 answer

How to create WordPress themes?

Steps to Create a WordPress Theme Set Up ...READ MORE

Feb 24 in PHP by Kavya
390 views
0 votes
0 answers

How do you defend against DDoS attacks?

DDoS attacks overload a network or service ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
197 views
0 votes
0 answers

How do you manage critical interdependencies in complex projects?

I’m working on a complex project where ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
231 views
0 votes
0 answers

How do you handle conflicting stakeholder feedback on deliverables?

I'm currently working on a project where ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
255 views
+1 vote
1 answer

How can I optimize Power BI performance when working with an SSAS Multidimensional Cube?

Thus, all performance improvements for Power BI ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
314 views
0 votes
0 answers

How do I utilize Keras Callbacks to implement early stopping during model training?

With the help of python programming can ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
333 views
0 votes
0 answers
0 votes
1 answer

How to preload a component in Angular?

In Angular, components are not preloaded directly, ...READ MORE

Feb 24 in Angular by Navya
354 views
0 votes
0 answers

Why does enabling multi-factor authentication increase your security?

Multi-factor authentication (MFA) adds an extra layer ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
183 views
0 votes
1 answer

How can you implement forkJoin for multiple API responses aggregation?

In Angular, forkJoin is used to combine ...READ MORE

Feb 24 in Node-js by Navya
353 views
0 votes
0 answers
0 votes
1 answer

What is the default response type of HttpClient service?

By default, HttpClient assumes the server response ...READ MORE

Feb 25 in Node-js by Navya
317 views
0 votes
0 answers

How do I optimize the batch size for a VAE model to achieve faster convergence with balanced accuracy?

With the help of proper code example ...READ MORE

Feb 22 in Generative AI by Nidhi
• 16,260 points
367 views
0 votes
0 answers

How do RBAC and ABAC models regulate access control?

Role-Based Access Control (RBAC) and Attribute-Based Access ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
177 views
0 votes
0 answers

How do you keep the team focused if they lack interest in the project topic?

I've been in situations where the team ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
305 views
0 votes
0 answers

What’s your method for quickly evaluating vendor reliability?

How do you quickly figure out if ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
218 views
0 votes
0 answers

How do you assess project viability if objectives remain uncertain?

How do you decide if a project ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
217 views
0 votes
0 answers

How do I implement a CNN-LSTM hybrid model for video classification tasks?

Can you tell me How do I ...READ MORE

Feb 24 in Generative AI by Ashutosh
• 33,350 points
322 views
0 votes
0 answers

When should you use TCP over UDP for network communication?

TCP and UDP have different strengths based ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
227 views
0 votes
0 answers

What's your approach to managing multiple projects with overlapping deadlines?

How do you manage multiple projects with ...READ MORE

Feb 25 in PMP by Parshvi
• 740 points
302 views
0 votes
1 answer

Which of the following method is used for cross-domain Ajax calls?

The correct method used for cross-domain Ajax ...READ MORE

Feb 26 in Angular by Kavya
268 views
0 votes
1 answer

What is the use of takeUntil to cancel a subscription?

takeUntil is an RxJS operator used to ...READ MORE

Feb 24 in Node-js by Navya
342 views
0 votes
0 answers

What’s your approach to maintaining project quality during budget cuts?

I'm currently managing a project where we're ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
240 views
0 votes
1 answer

Can we create a custom directive in Angular?

You can create a custom directive in ...READ MORE

Feb 26 in Angular by Tanya
265 views
0 votes
1 answer

How to set read concern in MongoDB?

In MongoDB, you can set read concern ...READ MORE

Feb 23 in Node-js by Kavya
400 views
+1 vote
1 answer

Why do Power BI visuals created using Python scripts sometimes appear misaligned, and how can this be fixed?

So, while writing a Python script to ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
298 views
0 votes
1 answer

How would you manage the state between different components of the site?

Method Description Best For Props (Parent to Child) Pass data from ...READ MORE

Feb 24 in Node-js by Kavya
385 views
0 votes
0 answers

How can you generate realistic images from textual descriptions using DALL·E or CLIP?

With the help of code can you ...READ MORE

Feb 22 in Generative AI by Ashutosh
• 33,350 points
362 views
0 votes
1 answer

How do you automate vulnerability scoring in the CVSS system?

Automating vulnerability scoring using the Common Vulnerability ...READ MORE

Feb 21 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
478 views
0 votes
0 answers

How can I visualize model training history using Keras and matplotlib for performance analysis?

With the help of code can you ...READ MORE

Feb 24 in Generative AI by Vani
• 3,580 points
293 views
0 votes
0 answers

What is zero-trust security in access administration?

Zero-trust security follows the principle of "never ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
165 views
0 votes
0 answers
0 votes
1 answer

Should I use map or switchmap when using angular http module?

When working with the Angular HTTP module, ...READ MORE

Feb 24 in Angular by Navya
335 views
0 votes
1 answer

How do I fix a 401 unauthorized status code?

A 401 Unauthorized status code means the ...READ MORE

Feb 26 in Angular by Kavya
259 views
0 votes
1 answer

What methods are available to force a component to re-render when using React hooks?

Here are the primary methods available to ...READ MORE

Feb 23 in Node-js by Kavya
412 views
0 votes
1 answer

How to secure a WordPress site from Brute Force Attacks?

Securing your WordPress site against brute force ...READ MORE

Feb 25 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points

reshown Mar 12 by Anupam 299 views
0 votes
1 answer

How do you integrate authentication with React-Router?

To integrate authentication with React Router, follow ...READ MORE

Feb 24 in Node-js by Kavya
362 views
0 votes
0 answers

How to check integrity of a file in Linux?

I want to verify whether a file ...READ MORE

Feb 26 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
255 views