Trending questions in Edureka Community

0 votes
0 answers

How to extend a pipe in Angular?

Can someone exlpain me with the code ...READ MORE

Mar 6 in Angular by Nidhi
• 13,600 points
59 views
0 votes
0 answers

How is AI used in phishing detection?

AI helps detect phishing attacks by analyzing ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
60 views
0 votes
0 answers

Describe a time when you had to lead a team through a significant change. How did you manage it?

What steps do you take to manage ...READ MORE

Mar 7 in PMP by Parshvi
• 3,700 points
44 views
0 votes
0 answers

What steps would you take if a key team member unexpectedly leaves the project?

What would you do if an important ...READ MORE

Mar 7 in PMP by Parshvi
• 3,700 points
49 views
0 votes
0 answers

Why Does My Node.js MongoDB Query Throw a 'TypeError: Argument Must Be a String' for Custom ObjectID?

Can someone exlpain me with the code ...READ MORE

Mar 6 in Node-js by Nidhi
• 13,600 points
57 views
0 votes
0 answers

Describe a time when you failed to identify a critical risk. How did you handle the situation?

Have you ever missed a major risk ...READ MORE

Mar 7 in PMP by Parshvi
• 3,700 points
42 views
0 votes
0 answers

How do you handle a situation where a team member disagrees with your project decisions?

What would you do if a team ...READ MORE

Mar 7 in PMP by Parshvi
• 3,700 points
41 views
0 votes
1 answer

Handling Text-Based Date Columns with Errors in Power Query

To correctly transform a text-based date column ...READ MORE

Mar 5 in Power BI by anonymous
• 24,110 points
95 views
0 votes
0 answers

What are the differences between mergeMap, concatMap, and switchMap?

can someone explain me What are the ...READ MORE

Mar 5 in Angular by Nidhi
• 13,600 points
91 views
0 votes
0 answers

How to prevent session hijacking in a Node.js app?

Session hijacking allows attackers to take over ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
78 views
0 votes
0 answers

How would you handle a situation where an identified risk becomes a reality?

If a risk you planned for actually ...READ MORE

Mar 7 in PMP by Parshvi
• 3,700 points
33 views
0 votes
0 answers

How to analyze logs for cyber threat detection?

Log files provide valuable insights into system ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
48 views
0 votes
0 answers

What is the difference between debounceTime and debounce?

Can you tell me what the difference ...READ MORE

Mar 5 in Angular by Nidhi
• 13,600 points
89 views
0 votes
0 answers

How would you manage a situation where a risk mitigation plan is not effective?

What would you do if your risk ...READ MORE

Mar 7 in PMP by Parshvi
• 3,700 points
31 views
0 votes
0 answers

How to enforce PCI DSS compliance in web applications?

PCI DSS sets security standards for handling ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
74 views
0 votes
0 answers

Describe a time when you had to lead a team through a significant change. How did you manage it?

Can you share a time when you ...READ MORE

Mar 7 in PMP by Parshvi
• 3,700 points
29 views
0 votes
0 answers

How do you handle a situation where a team member disagrees with your project decisions?

How do you go about assessing risks ...READ MORE

Mar 7 in PMP by Parshvi
• 3,700 points
28 views
0 votes
0 answers

Is ethical hacking the same as penetration testing?

Ethical hacking and penetration testing both involve ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
43 views
0 votes
0 answers

How does takeUntil() help in cleaning up Observables?

i want know with the help of ...READ MORE

Mar 5 in Angular by Nidhi
• 13,600 points
82 views
0 votes
0 answers

How do you prioritize risks in a project with multiple high-impact potential issues?

If a project has multiple high-impact risks, ...READ MORE

Mar 7 in PMP by Parshvi
• 3,700 points
25 views
0 votes
0 answers

How to detect log-based anomalies using Python?

Analyzing logs can help detect unusual activity ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
69 views
0 votes
1 answer

Standardizing Customer Names to Proper Case in Power Query

To standardize customer names to Proper Case ...READ MORE

Mar 5 in Power BI by anonymous
• 24,110 points
81 views
0 votes
0 answers

Can we use async pipe instead of manually subscribing?

With the help of an example, can ...READ MORE

Mar 5 in Angular by Nidhi
• 13,600 points
81 views
0 votes
0 answers

How do you apply transform functions in PipeTransform Interface?

i want know with the help of ...READ MORE

Mar 5 in Angular by Nidhi
• 13,600 points
80 views
0 votes
0 answers

What is the best way to share services across Modules in angular2?

i want know with the help of ...READ MORE

Mar 5 in Angular by Nidhi
• 13,600 points
80 views
0 votes
1 answer

Comparing Year-to-Date (YTD) vs. Previous Year YTD in a Financial Dashboard

The approach to creating such a comparison ...READ MORE

Mar 5 in Power BI by anonymous
• 24,110 points
80 views
0 votes
1 answer

Categorizing Employees Based on Sales Performance

In this classification, one should employ a ...READ MORE

Mar 5 in Power BI by anonymous
• 24,110 points
80 views
0 votes
1 answer

Creating a Dynamic Table for the Top 5 Selling Products per Region

As data on what to update was ...READ MORE

Mar 5 in Power BI by anonymous
• 24,110 points
79 views
0 votes
1 answer

Calculating Average Customer Purchase Frequency with Unique Customerspo

To accurately calculate the Average Customer Purchase ...READ MORE

Mar 5 in Power BI by anonymous
• 24,110 points
78 views
0 votes
0 answers

How do you quickly deploy a honeypot with Kali Linux?

A honeypot is a security mechanism designed ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
65 views
0 votes
0 answers

How do you ensure projects align with evolving industry standards?

With industries always changing, how do you ...READ MORE

Mar 4 in PMP by Parshvi
• 3,700 points
90 views
0 votes
0 answers

What are the benefits of ReplaySubject over BehaviorSubject?

I have a doubt about what the ...READ MORE

Mar 5 in Angular by Nidhi
• 13,600 points
75 views
0 votes
0 answers

Which Nmap flag is used for performing a default script scanning?

Nmap provides various flags for scanning networks ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
71 views
0 votes
1 answer

Filling Missing Values with the Previous Available Value in Power Query

This guide for filling missing values with ...READ MORE

Mar 5 in Power BI by anonymous
• 24,110 points
68 views
0 votes
0 answers

What is the Cyber Kill Chain often used to analyze an attacker’s methods?

The Cyber Kill Chain outlines the stages ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
55 views
0 votes
0 answers

Can you stop email spoofing?

Email spoofing allows attackers to forge sender ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
54 views
0 votes
0 answers

How is MITRE ATT&CK used?

MITRE ATT&CK is a framework that maps ...READ MORE

Mar 6 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
54 views
0 votes
0 answers

How do you address stakeholder dissatisfaction post-project completion?

I'm curious, how do you typically address ...READ MORE

Mar 4 in PMP by Parshvi
• 3,700 points
78 views
0 votes
1 answer

Implementing a Slicer to Toggle Between Daily, Monthly, and Yearly Sales Aggregation

1. Create an Aggregation Table with values: ...READ MORE

Mar 5 in Power BI by anonymous
• 24,110 points
62 views
0 votes
1 answer

Removing Duplicate Transactions While Keeping the Latest Entry

An approach to eliminate duplicate transactions while ...READ MORE

Mar 5 in Power BI by anonymous
• 24,110 points
59 views
0 votes
0 answers

How to lazy load module after api response in angular?

Can someone exlpain me with the code ...READ MORE

Mar 6 in Angular by Nidhi
• 13,600 points
56 views
0 votes
0 answers

How to run a Python 3 script in OWASP ZAP?

OWASP ZAP is a security testing tool ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
57 views
0 votes
0 answers

Agile vs. Lean – which is better for continuous improvement?

When it comes to continuous improvement, which ...READ MORE

Mar 4 in PMP by Parshvi
• 3,700 points
65 views
0 votes
0 answers

How to implement XSS protection in a Node.js app?

Cross-Site Scripting (XSS) is a common web ...READ MORE

Mar 5 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
52 views
0 votes
1 answer

Automating Monthly Sales Data Consolidation from SharePoint

Power Query has been used to automate ...READ MORE

Mar 5 in Power BI by anonymous
• 24,110 points
50 views
0 votes
0 answers

Why do we need to unsubscribe from observable?

Can you explain to me with an ...READ MORE

Mar 5 in Angular by Nidhi
• 13,600 points
50 views
0 votes
0 answers

How would you handle a situation where key project stakeholders have conflicting objectives?

What would you do if key stakeholders ...READ MORE

Mar 4 in PMP by Parshvi
• 3,700 points
62 views
0 votes
0 answers

Can you explain memory leaks?

With the help of an example and ...READ MORE

Mar 5 in Angular by Nidhi
• 13,600 points
48 views
0 votes
0 answers

How do you handle a major shift in project goals due to market changes?

If a major shift in the market ...READ MORE

Mar 4 in PMP by Parshvi
• 3,700 points
61 views