Trending questions in Edureka Community

0 votes
1 answer

How can asymmetric encryption be applied to user data to allow unauthenticated input?

Asymmetric encryption can be effectively applied to ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 12,480 points
36 views
0 votes
1 answer

Do integrity and authentication always go hand-in-hand, and why?

Integrity and authentication often go hand-in-hand, but ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 12,480 points
35 views
0 votes
1 answer

How to disable input field in Angular on condition?

Bind to [disabled] Attribute You can bind the ...READ MORE

Dec 4, 2024 in Web Development by Navya
71 views
0 votes
1 answer

Are API encryption key vault services truly secure?

API encryption key vault services can be ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 12,480 points
34 views
0 votes
1 answer

How can I get a 12-byte authentication tag in AES-GCM?

To generate a 12-byte (96-bit) authentication tag ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 12,480 points
31 views
0 votes
0 answers
0 votes
1 answer

How to implement a search box in Angular?

1. Create an Angular Component ng generate component search 2. App ...READ MORE

Dec 4, 2024 in Web Development by Navya
65 views
0 votes
0 answers

What are the steps for migrating Power BI collections to Power BI Embedded?

What are the steps for migrating Power ...READ MORE

Dec 5, 2024 in Power BI by Evanjalin
• 9,070 points
53 views
0 votes
1 answer

Why does "window is not defined" error occur in Next.js?

"window is not defined" error in Next.js ...READ MORE

Dec 4, 2024 in Web Development by navya
61 views
0 votes
1 answer

How to create a donut with rounded edges in one direction and a white border between segments?

You can use CSS and conic-gradient for ...READ MORE

Dec 4, 2024 in Web Development by navya
64 views
0 votes
1 answer

Are pointers available in JavaScript?

No, there are no pointers in JavaScript. JavaScript ...READ MORE

Dec 4, 2024 in Web Development by Navya
56 views
0 votes
1 answer

How do you manage configuration changes in microservices without causing downtime?

It takes a combination of techniques and ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 7,530 points
56 views
0 votes
1 answer

What is the most efficient way to read large file using Node.JS(LTS)?

Using Streams Steps to read a large file ...READ MORE

Dec 4, 2024 in Web Development by Navya
58 views
0 votes
1 answer

How do you use TensorFlow’s Keras to create a generative model for image synthesis?

 You can use TensorFlow's Keras to create ...READ MORE

Dec 4, 2024 in Generative AI by receptionboy
72 views
0 votes
1 answer

How do you delete a local branch in Git?

1. Delete a Local Branch (Safe Method) If ...READ MORE

Dec 4, 2024 in Web Development by kavya
52 views
0 votes
1 answer

How to parse a date in Java?

Using DateTimeFormatter  Example: import java.time.LocalDate; import java.time.format.DateTimeFormatter; public class DateParsing { ...READ MORE

Dec 4, 2024 in Web Development by Navya
52 views
0 votes
1 answer

Write a function to create gradient descent updates for a generative adversarial network in TensorFlow.

The function to create gradient descent updates for ...READ MORE

Dec 4, 2024 in Generative AI by madhav
69 views
0 votes
1 answer

What practices do you follow to ensure observability in event-driven or serverless architectures?

It takes specific procedures to handle the ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 7,530 points
49 views
0 votes
1 answer

How can you use CSS variables in your styles?

To define a CSS variable, use the ...READ MORE

Dec 4, 2024 in Web Development by Navya
50 views
0 votes
1 answer

How can I optimize training time using mixed-precision with TensorFlow?

You can optimize training time using mixed-precision ...READ MORE

Dec 4, 2024 in Generative AI by techgirl
64 views
0 votes
1 answer

How do you implement multi-GPU training in PyTorch for large-scale generative models?

 You  can implement multi-GPU training in PyTorch ...READ MORE

Dec 4, 2024 in Generative AI by magadh
64 views
0 votes
1 answer

How can you center an element vertically using CSS?

Using Flexbox .container { display: flex; ...READ MORE

Dec 4, 2024 in Web Development by navya
48 views
0 votes
1 answer

How does a Key Distribution Center (KDC) distribute the session key in symmetric encryption?

A Key Distribution Center (KDC) securely distributes ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 12,480 points
50 views
0 votes
1 answer

How do you serve static files efficiently using Express.js?

Serving static files effectively using Express.js Use express.static() ...READ MORE

Dec 4, 2024 in Web Development by Navya
43 views
0 votes
1 answer

What are the best practices for cryptography in this scenario?

Here are the Top 5 Best Practices ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 12,480 points
49 views
0 votes
1 answer

How do you implement model checkpointing in PyTorch while training Generative AI models?

To implement model checkpointing in PyTorch for ...READ MORE

Dec 4, 2024 in Generative AI by techboy
60 views
0 votes
0 answers
0 votes
0 answers

How can you use tensor slicing to speed up training on large datasets for Generative AI?

Can you explain, using Python programming, how ...READ MORE

Dec 5, 2024 in Generative AI by Ashutosh
• 10,380 points
42 views
0 votes
1 answer

How do you integrate a distributed tracing solution into your DevOps workflows?

The following actions are involved in incorporating ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 7,530 points
40 views
0 votes
1 answer

How can I pass user identity to a different REST service?

To securely pass user identity between REST ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 12,480 points
46 views
0 votes
1 answer

How can I check if a private key and certificate match in OpenSSL with ECDSA?

To check if a private key matches ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 12,480 points
46 views
0 votes
1 answer

How can I explain to non-tech friends why "cryptography is good"?

Using relevant examples and highlighting its daily ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 12,480 points
41 views
0 votes
1 answer

How can you generate audio samples with a pretrained neural net like WaveNet?

To generate audio samples with a pre-trained ...READ MORE

Dec 4, 2024 in Generative AI by dhriti singh
50 views
0 votes
1 answer
0 votes
1 answer

How can I implement text summarization using a BERT-based model?

You can implement text summarization using a ...READ MORE

Dec 4, 2024 in Generative AI by anupmaa
47 views
0 votes
1 answer

What’s the code to generate mel-spectrograms from audio for training Generative AI models?

Here is a concise example of generating mel-spectrograms ...READ MORE

Dec 4, 2024 in Generative AI by nidhi jha
44 views
0 votes
1 answer

How can you combine Power Pivot with Power Query to perform complex data transformations and load the data into Power BI efficiently?

For really complicated transformations using Power Pivot ...READ MORE

Dec 3, 2024 in Power BI by pooja
• 10,510 points
64 views
0 votes
1 answer
0 votes
1 answer

What are the key differences between classic release pipelines and YAML pipelines in Azure DevOps?

Traditional Release Pipelines: UI-Based: Developed and controlled using ...READ MORE

Dec 3, 2024 in DevOps Tools by Gagana
• 7,530 points
64 views
0 votes
1 answer

What is your approach to security scanning for open-source dependencies in DevOps?

How to Use Dependency Management Tools to ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 7,530 points
45 views
0 votes
0 answers

How to handle browser back button in Angular 12?

How to handle browser back button in ...READ MORE

Dec 4, 2024 in Web Development by Nidhi
• 4,940 points
55 views
0 votes
1 answer

What techniques do you use to ensure that Power Pivot data models scale properly as your dataset size grows?

Here are some tips to help maintain ...READ MORE

Dec 3, 2024 in Power BI by pooja
• 10,510 points
56 views
0 votes
1 answer

What practices do you follow for container health checks and lifecycle management?

The stability and dependability of containerized applications ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 7,530 points
41 views
0 votes
1 answer

How can I configure and troubleshoot YAML release pipelines in Azure DevOps?

To set up and diagnose Azure DevOps ...READ MORE

Dec 3, 2024 in DevOps Tools by Gagana
• 7,530 points
59 views
0 votes
1 answer

What are the best practices for designing a Power BI user activity dashboard?

Best Practices for Designing Power BI Dashboard ...READ MORE

Dec 3, 2024 in Power BI by pooja
• 10,510 points
51 views
0 votes
1 answer

How can I improve the performance of Ansible playbooks in large environments?

The following methods can help optimize Ansible ...READ MORE

Dec 3, 2024 in DevOps Tools by Gagana
• 7,530 points
55 views
0 votes
0 answers

How to guard route by user role ?

How to guard route by user role ...READ MORE

Dec 4, 2024 in Web Development by Nidhi
• 4,940 points
46 views
0 votes
0 answers

How can you create chainable route handlers for a route path in the Express JS app?

How can you create chainable route handlers ...READ MORE

Dec 4, 2024 in Web Development by Nidhi
• 4,940 points
40 views
0 votes
1 answer

What encryption and decryption algorithms are used in GSM?

GSM (Global System for Mobile Communications) uses ...READ MORE

Dec 3, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 12,480 points
43 views
0 votes
1 answer