Trending questions in Edureka Community

0 votes
0 answers

How to pass data from one service to another service in Angular?

Explain me with the help of an ...READ MORE

Mar 3 in Angular by Nidhi
• 13,600 points
54 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

What’s the risk of weak passwords in network security?

Weak passwords are a major security vulnerability, ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
62 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How do you create a reusable component in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 13,600 points
59 views
0 votes
0 answers
0 votes
0 answers

Why would you use a service in Angular and how is it different from a component?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 13,600 points
56 views
0 votes
0 answers

How to create currency pipe in Angular?

Can you help me with a code ...READ MORE

Mar 3 in Angular by Nidhi
• 13,600 points
54 views
0 votes
0 answers

How to encrypt sensitive data using AES in Python?

AES (Advanced Encryption Standard) is widely used ...READ MORE

Mar 4 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
51 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

What is the difference between dependency injection and service in Angular?

Can you explain with an example that ...READ MORE

Mar 3 in Angular by Nidhi
• 13,600 points
49 views
0 votes
1 answer

How can OData be efficiently used in Power BI for connecting to and managing data sources?

OData (Open Data Protocol) is a RESTful ...READ MORE

Feb 28 in Power BI by anonymous
• 24,110 points
165 views
0 votes
0 answers
0 votes
0 answers

How is salting used to increase the security of a user's stored password?

Salting adds a unique random value to ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
50 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How do Identity and Access Management (IAM) systems work?

Identity and Access Management (IAM) systems control ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
45 views
0 votes
0 answers

What’s the difference between SSO and federated identity?

Single Sign-On (SSO) and federated identity both ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
44 views
0 votes
0 answers
0 votes
1 answer

Why is the RLS role not being applied when executing queries via the Power BI REST API using PowerShell, and how can I fix it?

RLS roles may not be applied when ...READ MORE

Feb 28 in Power BI by anonymous
• 24,110 points
159 views
0 votes
0 answers
0 votes
0 answers

How do you implement K-means++ initialization in KMeans clustering using Scikit-learn?

Can you tell me How do you ...READ MORE

Mar 2 in Generative AI by Nidhi
• 13,600 points
73 views
0 votes
1 answer

Why am I getting an "SSL Certificate Chain Not Trusted" error when connecting SQL Server to Power BI, and how do I resolve it?

The "SSL Certificate Chain Not Trusted" error ...READ MORE

Feb 28 in Power BI by anonymous
• 24,110 points
159 views
0 votes
0 answers

What’s the difference between Observables and Promises?

With the help of an example, can ...READ MORE

Mar 3 in Angular by Nidhi
• 13,600 points
66 views
0 votes
0 answers

How does a password manager increase security?

Password managers store and generate strong, unique ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
40 views
0 votes
0 answers

How do you address lack of context when generating email responses using large language models?

Can i know How do you address ...READ MORE

Mar 2 in Generative AI by Nidhi
• 13,600 points
67 views
0 votes
0 answers

How do you perform feature engineering using PolynomialFeatures in Scikit-learn for regression tasks?

With the help of proper code example ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 24,610 points
67 views
0 votes
0 answers

How do phishing attacks lead to identity theft?

Phishing attacks trick users into revealing sensitive ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 14,380 points
33 views
0 votes
1 answer

How can I extract a list of used and unused measures and columns from Power BI project folders using Python?

The extracted measures and columns, which represent ...READ MORE

Feb 28 in Power BI by anonymous
• 24,110 points
151 views
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer

What are the steps to create and customize a Waterfall chart in Power BI?

A Waterfall chart in Power BI is useful for ...READ MORE

Feb 28 in Power BI by anonymous
• 24,110 points
143 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer
0 votes
0 answers

What steps can be taken to fix dead neurons during training of a text generation model?

Can i know What steps can be ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 24,610 points
53 views
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer
0 votes
0 answers
0 votes
0 answers

How do you implement L2 regularization to improve SVM classification performance in Scikit-learn?

Can i know How do you implement ...READ MORE

Mar 2 in Generative AI by Nidhi
• 13,600 points
52 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How would you resolve underperformance in language models during text generation tasks?

Can you tell me How would you ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 24,610 points
50 views