Trending questions in Edureka Community

0 votes
0 answers

Can you stop email spoofing?

Email spoofing allows attackers to forge sender ...READ MORE

Mar 6, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
367 views
0 votes
0 answers

How can you fix memory consumption issues in a GPT-based model trained for long-text generation?

Can i know How can you fix ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,370 points
497 views
0 votes
0 answers

How would you deal with multicollinearity using Scikit-learn when training a Linear Regression model?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,370 points
499 views
0 votes
1 answer

How can props be passed using Link in React Router?

In React Router, you can pass data ...READ MORE

Feb 21, 2025 in Node-js by kavya
1,090 views
0 votes
2 answers

What options exist for using Power BI without the need for an Azure-based server infrastructure?

You can use Power BI Report Server ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,061 views
0 votes
0 answers

How would you fix syntax errors when training a transformer model for code generation tasks?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,370 points
496 views
0 votes
0 answers

How do you navigate complex approval processes with multiple stakeholders?

I’m working on a project that needs ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
627 views
0 votes
0 answers

What is the role of Adam optimizer in Keras, and how do I choose the best learning rate for it?

Can you explain to me What is ...READ MORE

Feb 24, 2025 in Generative AI by Vani
• 3,580 points
705 views
0 votes
0 answers

How would you troubleshoot lack of coherence in generated dialogue when using a language model?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
487 views
0 votes
0 answers

How would you handle a sudden rise in project costs due to market changes?

You planned the budget carefully, but then ...READ MORE

Feb 28, 2025 in PMP by Parshvi
• 7,940 points
577 views
0 votes
0 answers

How do you optimize resource allocation in a resource-constrained project?

How do you manage a project when ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
617 views
0 votes
1 answer

How do you embed a document in MongoDB for better performance?

Embedding documents in MongoDB is a common ...READ MORE

Feb 22, 2025 in Node-js by Kavya
865 views
0 votes
0 answers

How would you handle a situation where the project scope is continuously changing?

How do you handle a situation where ...READ MORE

Mar 5, 2025 in PMP by Parshvi
• 7,940 points
402 views
0 votes
1 answer

How to apply filter and map in a pipeline for specific data processing?

In RxJS, filter is used to remove ...READ MORE

Feb 24, 2025 in Java-Script by Navya
744 views
0 votes
0 answers

What’s your approach to maintaining transparency in high-risk projects?

I’m managing a high-risk project where things ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
617 views
0 votes
0 answers

What security measures protect against MITM attacks?

Man-in-the-Middle (MITM) attacks allow attackers to intercept ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
582 views
0 votes
1 answer

How does an attacker bypass CSP (Content Security Policy)?

Content Security Policy (CSP) is a critical ...READ MORE

Feb 21, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
881 views
0 votes
0 answers

How do you handle over-dependence on a single key team member?

I’m managing a project where one team ...READ MORE

Feb 27, 2025 in PMP by Parshvi
• 740 points
613 views
0 votes
0 answers

How do you address lack of context when generating email responses using large language models?

Can i know How do you address ...READ MORE

Mar 2, 2025 in Generative AI by Nidhi
• 16,260 points
478 views
0 votes
0 answers

How do you handle scenarios where a project faces prolonged resource shortages?

I’m managing a project that’s been dealing ...READ MORE

Feb 26, 2025 in PMP by Parshvi
• 740 points
635 views
0 votes
1 answer

How are default props declared in a React functional component?

In React functional components, default prop values ...READ MORE

Feb 21, 2025 in Node-js by kavya
1,069 views
0 votes
1 answer

How to set read concern in MongoDB?

In MongoDB, you can set read concern ...READ MORE

Feb 23, 2025 in Node-js by Kavya
794 views
0 votes
2 answers

What are the steps for setting up OAuth 2.0 authentication between Power BI and Autodesk Forge?

To set up OAuth 2.0 authentication between ...READ MORE

Apr 3, 2025 in Power BI by anonymous
• 24,450 points
1,236 views
0 votes
2 answers

What is the Power BI Gateway architecture for hybrid data connections?

Power BI Gateway enables secure, encrypted data ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,123 views
0 votes
1 answer

Can we create a custom directive in Angular?

You can create a custom directive in ...READ MORE

Feb 26, 2025 in Angular by Tanya
656 views
0 votes
0 answers

How do you use TfidfVectorizer in Scikit-learn to transform text data for a classification task?

With the help of proper code can ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,370 points
473 views
0 votes
1 answer

How does the @Component directive define Angular components?

The @Component decorator defines a component by ...READ MORE

Feb 26, 2025 in Angular by Navya
655 views
0 votes
0 answers

What’s the impact of network enumeration on cybersecurity?

Network enumeration can be used by both ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
570 views
0 votes
0 answers

How do you maintain engagement in projects with ambiguous timelines?

Some projects stretch on forever, with shifting ...READ MORE

Feb 28, 2025 in PMP by Parshvi
• 7,940 points
560 views
0 votes
1 answer

Which of the following method is used for cross-domain Ajax calls?

The correct method used for cross-domain Ajax ...READ MORE

Feb 26, 2025 in Angular by Kavya
654 views
0 votes
2 answers

What are the best practices for structuring a narrative-driven report in Power BI using Fabric?

Use a guided layout with clear visual ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,033 views
0 votes
0 answers

What's your approach to managing multiple projects with overlapping deadlines?

How do you manage multiple projects with ...READ MORE

Feb 25, 2025 in PMP by Parshvi
• 740 points
687 views
0 votes
1 answer

How do you pass and use URL parameters in a React-Router route?

Passing and Using URL Parameters in React ...READ MORE

Feb 23, 2025 in Node-js by Kavya
787 views
0 votes
0 answers
0 votes
0 answers

How would you resolve underperformance in language models during text generation tasks?

Can you tell me How would you ...READ MORE

Mar 2, 2025 in Generative AI by Ashutosh
• 33,370 points
466 views
0 votes
1 answer

How can session hijacking be detected in HTTP traffic?

Detecting session hijacking in HTTP traffic is ...READ MORE

Feb 25, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points

edited Mar 6, 2025 695 views
0 votes
3 answers

What practices should I follow to create scalable and maintainable Power BI data models?

To create a Power BI data model ...READ MORE

May 14, 2025 in Power BI by Gokul
• 610 points
1,037 views
0 votes
0 answers

How does a network-based intrusion prevention system secure a network?

A network-based intrusion prevention system (NIPS) monitors ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
554 views
0 votes
2 answers

Is there a Power BI connector to track and visualize user activity within Power BI reports?

Power BI does not have a native ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,115 views
0 votes
0 answers

How would you proceed if you identify a skills gap too late in a project?

You’re deep into a project, and suddenly ...READ MORE

Feb 28, 2025 in PMP by Parshvi
• 7,940 points
554 views
+1 vote
1 answer

How can I optimize Power BI performance when working with an SSAS Multidimensional Cube?

Thus, all performance improvements for Power BI ...READ MORE

Feb 24, 2025 in Power BI by anonymous
• 36,180 points
681 views
0 votes
1 answer

What are the steps to consume an API in a React app using the Fetch method?

Steps to Consume an API in a ...READ MORE

Feb 23, 2025 in Node-js by Kavya
780 views
0 votes
1 answer

What is the difference between hashing and masking?

Hashing and masking are two distinct techniques ...READ MORE

Jan 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,669 views
0 votes
1 answer

How would you implement routing in a dynamic Music Store application?

Implementing Routing in a Dynamic Music Store ...READ MORE

Feb 23, 2025 in Node-js by Kavya
778 views
0 votes
0 answers

What are some common network threats and how do they work?

Networks face various security threats, including malware, ...READ MORE

Feb 28, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
558 views
0 votes
2 answers

What are some key considerations when deploying Power BI reports in a multi-tenant SaaS environment?

Use embedded Power BI with row-level security, ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 24,450 points
1,018 views
0 votes
0 answers

How can I implement word embedding using Keras for semantic text analysis?

With the help of proper code can ...READ MORE

Feb 24, 2025 in Generative AI by Vani
• 3,580 points
671 views
0 votes
0 answers

How do you handle team burnout in fast-paced project cycles?

How do you manage team burnout when ...READ MORE

Feb 25, 2025 in PMP by Parshvi
• 740 points
631 views
0 votes
2 answers

How can you customize the toolbar and add buttons in Power BI embedded reports?

You can customize the Power BI Embedded ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 24,450 points
1,540 views