Trending questions in Edureka Community

0 votes
0 answers

what is nist cybersecurity framework

What does the NIST (National Institute of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
557 views
0 votes
0 answers

fatal error: cs50.h (c language library) : No such file or directory

I am trying to use cs50 library ...READ MORE

Sep 16, 2023 in C++ by Mostafa

edited Mar 5 178 views
0 votes
0 answers

why is computer security important

What are the key reasons for the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
545 views
0 votes
0 answers

undefined reference to `get_string' cs50 library

i am having this problem it tells ...READ MORE

Sep 16, 2023 in C++ by Mostafa

edited Mar 5 163 views
0 votes
0 answers

what does cybersecurity protect?

Sep 4, 2023 in Cyber Security & Ethical Hacking by Rajarshi
• 470 points
537 views
0 votes
0 answers

What is print(f"...")

I'm looking at a Python script that ...READ MORE

Sep 18, 2023 in Python by Satyawrat
• 460 points

edited Mar 5 58 views
0 votes
0 answers

Shortcut to insert row in excel

What is the Excel shortcut for inserting ...READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
528 views
0 votes
0 answers

what is attack in information security

What is the concept of an 'attack' ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
531 views
0 votes
0 answers
0 votes
0 answers

how to stop cyber crime

Recently, a member of my family had ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
510 views
0 votes
1 answer

Typescript Errors: How do I ignore the error "property does not exist on value of type"

to ignore it globally, in your tsconfig.json, ...READ MORE

Jul 26, 2023 in TypeSript by john

edited Mar 5 11,362 views
0 votes
0 answers

What is print(f"...") ?

I'm looking at a Python script that ...READ MORE

Sep 18, 2023 in Python by Satyawrat
• 460 points

edited Mar 5 29 views
0 votes
0 answers

what is spear phishing in cyber security

What does the term 'spear phishing' mean ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
503 views
0 votes
0 answers

what is risk in cyber security

Hello, we are in the process of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
491 views
0 votes
0 answers

I have a very long list of datetime strings like these:

["Jun 1 2005 1:33PM", "Aug 28 1999 ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
474 views
0 votes
0 answers

what is security in information security

What does the term 'security' signify within ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
465 views
0 votes
0 answers

Why is digital marketing important in 2023?

I have been trying to know about ...READ MORE

Aug 31, 2023 in Digital Marketing by Rajarshi
• 470 points
534 views
0 votes
0 answers

what is wireshark in cyber security

What is the role and significance of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
453 views
0 votes
0 answers

how criminals plan the attacks in cyber security

Could you provide an in-depth explanation of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
449 views
0 votes
0 answers

what is data breach in cyber security

What constitutes a 'data breach' within the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
446 views
0 votes
0 answers

Automation for Download attachment from Gmail (UIPATH)

Hi, Please help me out on this issue. I ...READ MORE

Sep 14, 2023 in RPA by Vijay

edited Mar 5 131 views
0 votes
0 answers

what is cyber security policy

What does the term 'cybersecurity policy' refer ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
441 views
0 votes
0 answers

What is the extension of MS Excel?

Could someone tell me what is the ...READ MORE

Sep 8, 2023 in Others by Satyawrat
• 460 points
393 views
0 votes
0 answers

How to sort a dictionary using key?

Example input: {2:3, 1:89, 4:5, 3:0} Desired output: {1:89, 2:3, ...READ MORE

Sep 4, 2023 in Python by Satyawrat
• 460 points
546 views
0 votes
0 answers

What does %s in a Python format string mean?

For example, in the below code if len(sys.argv) ...READ MORE

Sep 5, 2023 in Python by Satyawrat
• 460 points
519 views
0 votes
0 answers

How do I use Python to change YOLO format comments to x1, y1, x2, y2 coordinates?

I want to know how to change ...READ MORE

Sep 16, 2023 in Python by Satyawrat
• 460 points

edited Mar 5 35 views
0 votes
0 answers

what is reactjs used for?

What are the practical applications and use ...READ MORE

Sep 15, 2023 in Java-Script by Edureka
• 12,690 points

edited Mar 5 59 views
0 votes
0 answers

what is threat intelligence in cyber security

What is meant by 'threat intelligence' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
415 views
0 votes
0 answers

what is cyber risk management?

"How does cyber risk management play a ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points

edited Mar 5 57 views
0 votes
0 answers

what does a information security analyst do?

"What are the primary responsibilities and daily ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points

edited Mar 5 56 views
0 votes
0 answers

how to protect cyber security?

How can businesses effectively fortify their cybersecurity ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points

edited Mar 5 57 views
0 votes
0 answers

what is iso in cyber security?

What role does ISO (International Organization for ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points

edited Mar 5 56 views
0 votes
0 answers

what is digital marketing strategy?

Sep 6, 2023 in Digital Marketing by anonymous
• 470 points
357 views
0 votes
0 answers

how to use cyber security?

"How can organizations effectively implement and integrate ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points

edited Mar 5 53 views
0 votes
0 answers

what is cyber crime and how to prevent it?

"What are the key characteristics and categories ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points

edited Mar 5 52 views
0 votes
0 answers

why is cybercrime increasing?

What are the underlying factors and trends ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points

edited Mar 5 51 views
0 votes
1 answer

Lock down Microsoft Excel macro

Protect/Lock Excel VBA Code: When we write VBA ...READ MORE

Oct 3, 2022 in Others by narikkadan
• 63,600 points
15,033 views
0 votes
0 answers

how to start a digital marketing agency?

What steps do I take to start ...READ MORE

Sep 13, 2023 in Digital Marketing by anonymous
• 470 points

edited Mar 5 114 views
0 votes
0 answers

how long does it take to learn cyber security?

What factors influence the time it takes ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points

edited Mar 5 32 views
0 votes
0 answers

what is information technology security

What is security in information technology, and ...READ MORE

Sep 15, 2023 in Cyber Security & Ethical Hacking by Edureka
• 12,690 points

edited Mar 5 30 views
+1 vote
1 answer

In GCP, how to list all the resources running under project?

For a specific organization, folder, or project, ...READ MORE

Nov 10, 2022 in GCP by Ashwini
• 5,430 points

edited Sep 6, 2023 by Khan Sarfaraz 13,294 views
0 votes
0 answers

what is cyberspace in cyber security

What constitutes 'cyberspace' within the realm of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
379 views
0 votes
0 answers

How to do PMP certification?

What is the step-by-step process for obtaining ...READ MORE

Sep 15, 2023 in PMP by Saniya
• 3,360 points

edited Mar 5 31 views
0 votes
0 answers
0 votes
0 answers

How to become a certified project manager?

What are the specific steps and requirements ...READ MORE

Sep 15, 2023 in PMP by Saniya
• 3,360 points

edited Mar 5 28 views
0 votes
0 answers

How to remove formula in excel shortcut

What is the Excel shortcut key for ...READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
369 views
0 votes
0 answers

What is function in MS Excel?

What is function in MS Excel? READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
369 views
0 votes
0 answers

How does super() operate in the presence of multiple inheritance? As an example, consider the following:

class First(object): def __init__(self): ...READ MORE

Sep 6, 2023 in Python by Satyawrat
• 460 points
413 views
0 votes
0 answers

why do we need cyber security

I'm now enrolled in a course on ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
365 views
0 votes
0 answers

what is snort in cyber security

What is the significance of 'Snort' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
359 views