Trending questions in Edureka Community

0 votes
1 answer

How to Detect and Secure Vulnerable Open Ports and Services?

Detecting and securing vulnerable open ports and ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
591 views
0 votes
1 answer

How can I retrieve the result of an asynchronous operation?

You can retrieve the result of an ...READ MORE

Jan 10 in Java-Script by Navya
462 views
0 votes
1 answer

Does a private key always generate the same public key?

Yes, a private key always generates the ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
545 views
0 votes
1 answer

What strategies can I use to improve sample diversity in a generative model?

To improve sample diversity in a generative ...READ MORE

Jan 9 in Generative AI by shrevani
496 views
+1 vote
2 answers

How do you format visuals dynamically based on conditional logic using DAX?

To vary the arrangement of the visuals ...READ MORE

Nov 20, 2024 in Power BI by pooja
• 24,450 points
691 views
0 votes
1 answer
+1 vote
2 answers

How do I create interactive dashboards that adjust based on user roles or permissions?

When designing interactive dashboards in Power BI ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
734 views
+1 vote
2 answers

How do you handle JSON data parsing and transformations in Power BI dataflows?

Using Power BI dataflows for parsing and ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
765 views
0 votes
1 answer

What are the categories of security control?

Security controls are essential measures implemented to ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
570 views
0 votes
1 answer

Why does my GAN produce a blurry image instead of sharp realistic ones?

To address this, use techniques like using ...READ MORE

Jan 8 in Generative AI by pulkit
526 views
+1 vote
2 answers

How do you handle duplicate data entries and deduplication logic in Power BI transformations?

Approaching duplicate data elements and formulating deduplication ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
747 views
0 votes
1 answer

How can I avoid sampling bias in my generative model during inference?

In order to avoid sampling bias in my ...READ MORE

Jan 9 in Generative AI by dhritiman singh
478 views
0 votes
1 answer

How do you track project dependencies and avoid bottlenecks?

Tracking project dependencies and avoiding bottlenecks is ...READ MORE

Jan 10 in PMP by Anu
456 views
0 votes
1 answer

What strategies do you use to manage projects with limited resources?

Managing projects with limited resources requires strategic ...READ MORE

Jan 10 in PMP by Sonia
456 views
+1 vote
3 answers

How do I create a flexible date range slicer that allows users to switch between monthly, quarterly, and yearly views?

Proper date hierarchy and dynamic date filters ...READ MORE

Nov 12, 2024 in Power BI by pooja
• 24,450 points
1,282 views
0 votes
1 answer

How can I prevent overfitting in a generative model trained on limited data?

To prevent overfitting in a generative model ...READ MORE

Jan 8 in Generative AI by chinese boy
521 views
0 votes
1 answer

What is collision resistance in a hash function?

Collision resistance is a fundamental property of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
411 views
0 votes
1 answer

What is the process for importing a JSON file in ECMAScript 6?

In ECMAScript 6 (ES6), importing a JSON ...READ MORE

Jan 10 in Java-Script by Navya
438 views
0 votes
1 answer

Why is my Power BI matrix/table visual displaying duplicate rows or incorrect totals?

Cause of duplicate rows or wrong totals ...READ MORE

Dec 30, 2024 in Power BI by Anu
• 3,020 points

edited Mar 6 1,903 views
0 votes
1 answer

How do I resolve NaN loss values when training a generative model in Julia with Flux?

To resolve NaN loss values when training ...READ MORE

Jan 8 in Generative AI by niya sa
517 views
0 votes
1 answer

Why does Nmap show closed ports?

When Nmap reports a port as closed, ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
518 views
0 votes
1 answer

How do I handle batch size adjustments when training large models in Flux?

To handle batch size adjustments when training ...READ MORE

Jan 9 in Generative AI by raju thapa
467 views
0 votes
1 answer

Is HTTP Authorization header encrypted?

When transmitting an HTTP Authorization header over ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
399 views
0 votes
1 answer

What distinguishes JavaScript from ECMAScript?

Aspect JavaScript ECMAScript Definition A programming language used primarily for web ...READ MORE

Jan 10 in Java-Script by Navya
381 views
0 votes
1 answer

How do I improve zero-shot generation using Hugging Face models like GPT-2?

To improve zero-shot generation with Hugging Face ...READ MORE

Jan 9 in Generative AI by madhav kumar
453 views
0 votes
1 answer

How to determine the hashing algorithm of a public key in the certificate?

To determine the hashing algorithm used to ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
502 views
0 votes
1 answer

Why does my Transformer-based text generation model produce incoherent sequences?

Incoherent sequences in Transformer-based text generation models ...READ MORE

Jan 8 in Generative AI by heretechboy
499 views
0 votes
1 answer

How can I fix the slow inference time when using Hugging Face’s GPT for large inputs?

To fix slow inference time with Hugging ...READ MORE

Jan 8 in Generative AI by balaji shivastava
499 views
0 votes
1 answer

How can a multiline string literal be assigned to a variable?

You can use template literals, introduced in ...READ MORE

Jan 10 in Java-Script by Navya
415 views
0 votes
1 answer

How do I fix discriminator overfitting in FastAI’s GAN training?

To fix discriminator overfitting in FastAI's GAN ...READ MORE

Jan 9 in Generative AI by amol shrivastav
446 views
0 votes
1 answer

How do I implement custom augmentation techniques for image generation?

To implement custom augmentation techniques for image ...READ MORE

Jan 9 in Generative AI by anupam mishra
446 views
+1 vote
2 answers

What’s the best approach to handle non-tabular data sources (e.g., unstructured data) in Power BI?

Power BI does have certain restrictions when ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
715 views
0 votes
1 answer

What’s your approach for managing stakeholders with conflicting priorities?

Managing stakeholders with conflicting priorities requires clear ...READ MORE

Jan 10 in PMP by Ali
422 views
0 votes
1 answer

Why should you not block or close ports in a firewall?

Blocking or closing ports in a firewall ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
493 views
0 votes
1 answer

How would you manage a project when you have limited visibility into stakeholder priorities?

Project management with less visibility into stakeholder ...READ MORE

Jan 10 in PMP by Anu
420 views
0 votes
1 answer

Is it possible to build unbreakable Protocol Obfuscation?

Achieving unbreakable protocol obfuscation—where a system is entirely ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
377 views
0 votes
1 answer

How do you deal with unexpected changes in project timelines?

Dealing with the change in project timelines ...READ MORE

Jan 7 in PMP by Sufi
593 views
0 votes
1 answer

How do you estimate project costs accurately from the start?

To develop precise cost estimates while accounting ...READ MORE

Jan 10 in PMP by Zaid
419 views
0 votes
1 answer

How is the public key included in the CSR?

When creating a Certificate Signing Request (CSR), ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
376 views
0 votes
1 answer

How can I resolve shape mismatch errors when feeding data into a Keras VAE?

To resolve shape mismatch errors when feeding ...READ MORE

Jan 8 in Generative AI by neha jha
481 views
+1 vote
1 answer

How do I generate an access token for Power BI Embedded securely?

Access Token Authentication for Power BI Embedded ...READ MORE

Dec 18, 2024 in Power BI by pooja
• 24,450 points
1,329 views
0 votes
1 answer

How do I avoid mode dropping when training a conditional GAN for high-resolution images?

In order to avoid mode dropping when training ...READ MORE

Jan 9 in Generative AI by Niraj yadav
431 views
0 votes
1 answer

What does the 'AddPackage' permission error mean in Azure DevOps, and how can it be resolved?

In Azure DevOps, the 'AddPackage' permission issue ...READ MORE

Dec 19, 2024 in DevOps Tools by Gagana
• 10,070 points
1,611 views
0 votes
1 answer

How do I resolve NaN gradients when training GANs in PyTorch?

In order to resolve NaN gradients when ...READ MORE

Jan 7 in Generative AI by anshuman yadav
496 views
0 votes
1 answer

Is encryption in HTTPS done by the browser or by the system?

When a browser establishes an HTTPS connection, ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
362 views
0 votes
1 answer

Is SSH public key authentication secure?

SSH public key authentication is generally more ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
362 views
0 votes
1 answer

How can I fix the vanishing gradient problem in TensorFlow for GANs?

To fix the vanishing gradient problem in ...READ MORE

Jan 9 in Generative AI by shalini bua
420 views
0 votes
1 answer

Why does my model generate inconsistent output in a conditional GAN?

To address this, ensure the conditioning input ...READ MORE

Jan 9 in Generative AI by evanjilin joshep
419 views
0 votes
2 answers

How do I enable and use data classification and sensitivity labels in Power BI?

Enable Sensitivity Labels: Under Tenant Settings in the Power ...READ MORE

Jan 23 in Power BI by anonymous
• 24,450 points
1,246 views