Trending questions in Edureka Community

0 votes
0 answers

What are the key differences between LSTM and GRU when applying them to time series forecasting?

Can i know What are the key ...READ MORE

Feb 24, 2025 in Generative AI by Ashutosh
• 33,350 points
654 views
0 votes
0 answers

How do you navigate complex approval processes with multiple stakeholders?

I’m working on a project that needs ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
548 views
0 votes
2 answers

How can I open a specific Power BI report directly in the Power BI mobile app, hosted on Power BI Report Server?

Configure the Power BI mobile app with ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,065 views
0 votes
1 answer

How do you choose the root node while constructing a decision tree?

Selecting the root node in a decision ...READ MORE

Feb 25, 2025 in Node-js by Navya
640 views
0 votes
0 answers

How would you handle a sudden rise in project costs due to market changes?

You planned the budget carefully, but then ...READ MORE

Feb 28, 2025 in PMP by Parshvi
• 7,940 points
502 views
0 votes
0 answers

How would you fix syntax errors when training a transformer model for code generation tasks?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
410 views
0 votes
0 answers

How do you handle over-dependence on a single key team member?

I’m managing a project where one team ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
543 views
0 votes
0 answers

How do you address lack of context when generating email responses using large language models?

Can i know How do you address ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
405 views
0 votes
0 answers

How would you resolve underperformance in language models during text generation tasks?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
405 views
0 votes
2 answers

How do I manage Power BI authentication using OAuth 2.0 in enterprise environments?

Use Azure AD to register an application, ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,055 views
0 votes
1 answer

How can you configure routing for a multi-page React application using React-Router?

To configure routing for a multi-page React ...READ MORE

Feb 23, 2025 in Node-js by Kavya
724 views
0 votes
0 answers

How do you manage vendor delays that impact the project timeline?

I'm managing a project, and vendor delays ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
560 views
0 votes
0 answers

How do you handle scenarios where a project faces prolonged resource shortages?

I’m managing a project that’s been dealing ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
559 views
0 votes
0 answers

How do you optimize resource allocation in a resource-constrained project?

How do you manage a project when ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
530 views
0 votes
0 answers

How do you maintain engagement in projects with ambiguous timelines?

Some projects stretch on forever, with shifting ...READ MORE

Feb 28, 2025 in PMP by Parshvi
• 7,940 points
485 views
+1 vote
2 answers

How do I incorporate storytelling techniques into a Power BI Fabric report to make data more engaging for non-technical audiences?

Three essential roles will be essential in ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
645 views
0 votes
0 answers

How do you use TfidfVectorizer in Scikit-learn to transform text data for a classification task?

With the help of proper code can ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
395 views
0 votes
1 answer

How would you manage the state between different components of the site?

Method Description Best For Props (Parent to Child) Pass data from ...READ MORE

Feb 24, 2025 in Node-js by Kavya
697 views
0 votes
0 answers

How to check integrity of a file in Linux?

I want to verify whether a file ...READ MORE

Feb 26, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
574 views
0 votes
0 answers

What’s your approach to maintaining transparency in high-risk projects?

I’m managing a high-risk project where things ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
522 views
0 votes
0 answers

What security measures protect against MITM attacks?

Man-in-the-Middle (MITM) attacks allow attackers to intercept ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
487 views
0 votes
0 answers

How does a network-based intrusion prevention system secure a network?

A network-based intrusion prevention system (NIPS) monitors ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
475 views
0 votes
0 answers

How would you use StratifiedKFold for a classification problem when class distribution is uneven?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,350 points
385 views
0 votes
0 answers

How do I implement a CNN-LSTM hybrid model for video classification tasks?

Can you tell me How do I ...READ MORE

Feb 24, 2025 in Generative AI by Ashutosh
• 33,350 points
620 views
0 votes
0 answers

What are some common network threats and how do they work?

Networks face various security threats, including malware, ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
477 views
0 votes
1 answer

How does the @Component directive define Angular components?

The @Component decorator defines a component by ...READ MORE

Feb 26, 2025 in Angular by Navya
561 views
0 votes
0 answers

How do I utilize Keras Callbacks to implement early stopping during model training?

With the help of python programming can ...READ MORE

Feb 24, 2025 in Generative AI by Ashutosh
• 33,350 points
613 views
0 votes
0 answers

How does IP addressing work in computer networks?

IP addresses are used to identify devices ...READ MORE

Feb 27, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
518 views
0 votes
1 answer

How to check Node version in Ubuntu?

To check the installed Node.js version in ...READ MORE

Feb 25, 2025 in Node-js by Navya
602 views
0 votes
0 answers

What’s the role of firewalls in network security?

Firewalls act as a barrier between trusted ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
473 views
0 votes
0 answers

How do you ensure knowledge transfer when a team member is replaced?

What's the best way to handle knowledge ...READ MORE

Feb 25, 2025 in PMP by Parshvi
• 740 points
550 views
0 votes
0 answers

What’s the impact of network enumeration on cybersecurity?

Network enumeration can be used by both ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
470 views
0 votes
0 answers

How do you resolve conflicts among team members with differing work styles?

I'm managing a team where everyone works ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
528 views
0 votes
0 answers

How would you proceed if critical project data became inaccessible?

I've been thinking about how to handle ...READ MORE

Feb 25, 2025 in PMP by Parshvi
• 740 points
587 views
0 votes
0 answers
0 votes
0 answers

What’s your method for de-escalating project conflicts with external vendors?

Vendor relationships can be tricky. When things ...READ MORE

Feb 28, 2025 in PMP by Parshvi
• 7,940 points
458 views
0 votes
0 answers

What's your approach to managing multiple projects with overlapping deadlines?

How do you manage multiple projects with ...READ MORE

Feb 25, 2025 in PMP by Parshvi
• 740 points
586 views
0 votes
1 answer

How can session hijacking be detected in HTTP traffic?

Detecting session hijacking in HTTP traffic is ...READ MORE

Feb 25, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points

edited Mar 6, 2025 594 views
0 votes
1 answer

How do you detect brute force login attempts in Apache logs?

Monitoring Apache web server logs is essential ...READ MORE

Feb 19, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
850 views
0 votes
1 answer

How would you implement routing in a dynamic Music Store application?

Implementing Routing in a Dynamic Music Store ...READ MORE

Feb 23, 2025 in Node-js by Kavya
683 views
0 votes
0 answers

How to identify privilege escalation attempts in Linux logs?

I need to monitor Linux logs for ...READ MORE

Feb 25, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
591 views
0 votes
0 answers
0 votes
1 answer

How to build an Angular project?

To build an Angular project, follow these ...READ MORE

Feb 25, 2025 in Angular by Navya
589 views
0 votes
0 answers

How do you ensure alignment between business and project objectives?

I’ve seen projects that seem like a ...READ MORE

Feb 28, 2025 in PMP by Parshvi
• 7,940 points
451 views
0 votes
0 answers

What are the best practices for access control policies?

Effective access control policies ensure that only ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
449 views
0 votes
1 answer

How to convert a Fetch API response to RxJS Observable?

To convert a Fetch API response into ...READ MORE

Feb 26, 2025 in Node-js by Kavya
542 views
+1 vote
1 answer

Why do Power BI visuals created using Python scripts sometimes appear misaligned, and how can this be fixed?

So, while writing a Python script to ...READ MORE

Feb 24, 2025 in Power BI by anonymous
• 36,180 points
575 views
0 votes
1 answer

How to set read concern in MongoDB?

In MongoDB, you can set read concern ...READ MORE

Feb 23, 2025 in Node-js by Kavya
676 views
0 votes
1 answer

How can we add the style conditionally in Angular?

In Angular, you can add styles conditionally ...READ MORE

Feb 26, 2025 in Angular by Tanya
539 views
0 votes
1 answer

How do I remove a service connection point in Active Directory?

Removing a Service Connection Point (SCP) from ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,231 views