Trending questions in Edureka Community

0 votes
0 answers

What role does hyperparameter search play in optimizing Generative AI pipelines?

With the help of proper code example ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
479 views
0 votes
1 answer

What are the negative aspects of creating fake security footprints?

Creating fake security footprints, such as misleading ...READ MORE

Feb 13, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
526 views
0 votes
1 answer

Why don't digital signatures reveal the sender’s private key?

Digital signatures are a cornerstone of modern ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
579 views
0 votes
0 answers

How does zero-shot inference improve Generative AI for unseen tasks?

With the help of code can you ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
466 views
0 votes
0 answers

What are the challenges in embedding large contexts in Generative AI for summarization tasks?

Can you tell me What the challenges ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
465 views
0 votes
0 answers

How do I set up CI/CD pipelines specifically for Generative AI model development?

With the help of code examples, can ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
457 views
0 votes
0 answers

How can federated learning be used to train Generative AI across distributed datasets?

With the help of code can you ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
480 views
0 votes
0 answers
0 votes
0 answers

How does regularization scaling impact Generative AI for hierarchical task optimization?

With the help of proper code examples, ...READ MORE

Feb 12, 2025 in Generative AI by Ashutosh
• 33,350 points
412 views
0 votes
1 answer

How can I compare two commits directly in the Azure DevOps web UI?

Follow these steps to compare two commits ...READ MORE

Dec 19, 2024 in DevOps Tools by Gagana
• 10,070 points
3,052 views
0 votes
1 answer

How is the digital certificate sent alongside digital signatures?

When a digital signature is applied to ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
552 views
0 votes
0 answers

testing question for logout case, please dont approve it

testing question for logout case, please dont ...READ MORE

Feb 11, 2025 in Career Counselling by anonymous

edited Mar 5, 2025 477 views
0 votes
0 answers

How to improve word output for hugging face models?

With the help of code, can you ...READ MORE

Feb 14, 2025 in Generative AI by Ashutosh
• 33,350 points
352 views
0 votes
0 answers

How do time decay models benefit Generative AI for real-time updates?

Can you tell me how time decay ...READ MORE

Feb 11, 2025 in Generative AI by Ashutosh
• 33,350 points
431 views
0 votes
0 answers

How can I use LoRA or quantization techniques to reduce model size without significant accuracy loss?

With the help of code can you ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
518 views
0 votes
0 answers

How do I identify and mitigate model hallucinations in domain-specific generative applications?

Can you tell me How do I ...READ MORE

Feb 10, 2025 in Generative AI by Nidhi
• 16,260 points
432 views
0 votes
0 answers

Are comments obsolete in favor of Generative AI?

Can you tell me if comments are ...READ MORE

Feb 14, 2025 in Generative AI by Ashutosh
• 33,350 points
325 views
0 votes
1 answer

How to exploit LDAP injection?

LDAP injection is a security vulnerability that ...READ MORE

Feb 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
434 views
0 votes
1 answer

Why do digital signatures need different algorithms?

Digital signatures are essential in modern cryptography ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
517 views
0 votes
1 answer

How do you implement data parallelism in model training for resource-constrained environments?

In order to implement data parallelism in resource-constrained ...READ MORE

Nov 13, 2024 in Generative AI by Ashutosh
• 33,350 points
4,292 views
0 votes
1 answer

How secure is the hashing, salting, and stretching process in this diagram?

Evaluating the security of your password hashing, ...READ MORE

Feb 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
501 views
0 votes
1 answer

Any reason I shouldn't be salting and hashing before putting through bCrypt?

When implementing password security with bcrypt, it's ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
522 views
0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
505 views
0 votes
2 answers

Can I use a single access token for multiple Power BI Embedded reports?

Yes, you can use a single access ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 36,180 points
715 views
+1 vote
2 answers

How do I register for a certification test for the pl 300?

These are the steps that can be ...READ MORE

Oct 25, 2024 in Power BI by pooja
• 24,450 points
4,127 views
0 votes
1 answer

Is salting a hash more secure than encrypting it?

When securing passwords, it's essential to understand ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
461 views
0 votes
1 answer

Would re-salting passwords regularly in-/decrease security?

Regularly re-salting and re-hashing stored passwords—changing the ...READ MORE

Feb 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
459 views
0 votes
1 answer

How to check if your phone is under surveillance?

If you think your phone might be ...READ MORE

Nov 25, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
3,703 views
0 votes
1 answer

Error - could not install packages due to an oserror - [errno 2] no such file or directory

I also met with the same problem ...READ MORE

Apr 28, 2022 in Python by narikkadan
• 86,360 points
44,437 views
0 votes
0 answers

Why can I ping a server, but an Nmap normal scan cannot see the host?

I'm trying to scan a network using ...READ MORE

Feb 7, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
516 views
+1 vote
1 answer

What is the difference between Power Pivot's Data Model and Power BI’s data model, and how can they be integrated effectively?

Power Pivot Data Model compared with Power ...READ MORE

Dec 2, 2024 in Power BI by pooja
• 24,450 points
1,264 views
+1 vote
1 answer

How do you handle many-to-many relationships in Power Pivot when designing a data model to ensure correct data aggregation?

Handling the many-to-many relationships is really intelligent ...READ MORE

Dec 2, 2024 in Power BI by pooja
• 24,450 points
1,257 views
+1 vote
2 answers
0 votes
1 answer

What is the best practice for renaming a branch in Azure DevOps while ensuring minimal disruption?

The Best Methods for Azure DevOps Branch ...READ MORE

Dec 5, 2024 in DevOps Tools by Gagana
• 10,070 points
3,184 views
+1 vote
1 answer

How can you use Power Pivot in Excel to create a star schema model and integrate it with Power BI for reporting?

How Power Pivot gives optimal data models: ...READ MORE

Dec 2, 2024 in Power BI by pooja
• 24,450 points
1,180 views
0 votes
1 answer

How to generate optimized source with and without sourcemap for production use?

To generate optimized source code with or ...READ MORE

Dec 31, 2024 in PHP by Navya
2,034 views
+1 vote
1 answer
0 votes
0 answers

Why does Google Vertex AI throw timeout errors during large batch inference jobs?

With the help of code example tell ...READ MORE

Jan 22, 2025 in Generative AI by Nidhi
• 16,260 points
939 views
0 votes
1 answer

Why is Nmap not showing open ports?

When Nmap fails to detect open ports ...READ MORE

Jan 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,704 views
+1 vote
1 answer
0 votes
1 answer

How to add popper.js in React?

Install Popper.js via npm (npm install @popperjs/core), ...READ MORE

Feb 23, 2025 in Node-js by Kavya
1,028 views
0 votes
1 answer

Why is my Power BI matrix/table visual displaying duplicate rows or incorrect totals?

Cause of duplicate rows or wrong totals ...READ MORE

Dec 30, 2024 in Power BI by Anu
• 3,020 points

edited Mar 6, 2025 2,993 views
+1 vote
1 answer

How do you optimize Power Pivot models to handle millions of rows of transactional data without degrading performance?

Capacity Modeling: Power Pivot models that process ...READ MORE

Dec 12, 2024 in Power BI by pooja
• 24,450 points
876 views
+1 vote
2 answers
0 votes
1 answer

How can I assign a variable to hold a multiline string in JavaScript?

You can assign a variable to hold ...READ MORE

Feb 7, 2025 in Java-Script by Navya
856 views
0 votes
1 answer

What is the method to convert a floating-point number to an integer in JavaScript?

You can convert a floating-point number to ...READ MORE

Feb 7, 2025 in Java-Script by Navya
842 views
0 votes
1 answer

How would you manage a scenario where a major client demands early delivery?

Managing an early delivery request from a ...READ MORE

Jan 28, 2025 in PMP by Anu
747 views