Trending questions in Edureka Community

0 votes
1 answer

What are the security risks of expired SSL certificates?

An expired SSL certificate poses several security ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
91 views
0 votes
1 answer

What is collision resistance in a hash function?

Collision resistance is a fundamental property of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
79 views
0 votes
1 answer

How can a multiline string literal be assigned to a variable?

You can use template literals, introduced in ...READ MORE

Jan 10 in Java-Script by Navya
108 views
0 votes
1 answer

How can I iterate through the properties of a JavaScript object?

You can iterate through the properties of ...READ MORE

Jan 10 in Java-Script by Navya
105 views
0 votes
1 answer

How can I properly format a date in JavaScript?

You can format a date in JavaScript ...READ MORE

Jan 10 in Java-Script by anonymous
101 views
0 votes
1 answer

How can I replace every instance of a string in JavaScript?

In JavaScript, replacing all instances of a ...READ MORE

Jan 10 in Java-Script by Navya
99 views
0 votes
1 answer

How is the public key included in the CSR?

When creating a Certificate Signing Request (CSR), ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
70 views
0 votes
1 answer

What is the correct way to check for an undefined value in JavaScript?

The correct ways to check for an ...READ MORE

Jan 10 in Java-Script by Navya
96 views
0 votes
1 answer

Is HTTP Authorization header encrypted?

When transmitting an HTTP Authorization header over ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
69 views
0 votes
1 answer

What happens if an SSL certificate is not renewed?

When an SSL certificate expires and is ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
69 views
0 votes
1 answer

What is the process for importing a JSON file in ECMAScript 6?

In ECMAScript 6 (ES6), importing a JSON ...READ MORE

Jan 10 in Java-Script by Navya
95 views
0 votes
1 answer

How do I delete a specific element from an array in JavaScript?

You can use the splice() method. Code: let arr ...READ MORE

Jan 10 in Java-Script by Navya
97 views
0 votes
1 answer

Why does Google add while(1); at the start of their JSON responses?

Google often adds while(1); (or a similar ...READ MORE

Jan 10 in Java-Script by Navya
91 views
0 votes
1 answer

Which hashing algorithm does not have known collision attacks?

When selecting a hashing algorithm, it's crucial ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
63 views
0 votes
1 answer

Is it possible to build unbreakable Protocol Obfuscation?

Achieving unbreakable protocol obfuscation—where a system is entirely ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
62 views
0 votes
1 answer

What is the purpose of "use strict" in JavaScript, and why is it used?

It is used to enable strict mode, ...READ MORE

Jan 10 in Java-Script by Navya
90 views
0 votes
1 answer

What are the key differences between "let" and "var"?

Feature var let Scope Function-scoped. Accessible within the function, even outside ...READ MORE

Jan 10 in Java-Script by anonymous
89 views
0 votes
1 answer

How do I verify if a given object is an array?

You can use the Array.isArray() method.This method ...READ MORE

Jan 10 in Java-Script by Navya
84 views
0 votes
1 answer

Which SSH security is stronger?

Ensuring robust SSH security involves careful selection ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
57 views
0 votes
1 answer

How would you manage a project when you have limited visibility into stakeholder priorities?

Project management with less visibility into stakeholder ...READ MORE

Jan 10 in PMP by Anu
95 views
0 votes
1 answer

Is code obfuscation common in FOSS?

In Free and Open-Source Software (FOSS), code ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
54 views
0 votes
1 answer

Does code obfuscation give any measurable security benefit?

Code obfuscation involves deliberately making code difficult ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
55 views
0 votes
1 answer

How to change the value of an Observable in TypeScript Angular?

To change the value of an Observable ...READ MORE

Feb 21 in Angular by Kavya
111 views
0 votes
1 answer

When is it appropriate to use arrow functions in ECMAScript 6?

Arrow functions, introduced in ECMAScript 6 (ES6), ...READ MORE

Jan 10 in Java-Script by Navya
81 views
0 votes
1 answer

Which SSH key is more secure?

When selecting an SSH key type for ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
54 views
0 votes
1 answer

What is the role of the var keyword, and in which situations should it be used or avoided?

In JavaScript, the var keyword is used ...READ MORE

Jan 10 in Java-Script by Navya
82 views
0 votes
1 answer

Is encryption in HTTPS done by the browser or by the system?

When a browser establishes an HTTPS connection, ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
53 views
0 votes
1 answer

How Can P2P Systems Recover Compromised Identities Using a Web-of-Trust?

In peer-to-peer (P2P) systems, the Web of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
53 views
0 votes
1 answer

Is SSH public key authentication secure?

SSH public key authentication is generally more ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
53 views
0 votes
1 answer

Why does my VAE model produce blurry samples despite a well-tuned discriminator?

To address this, try improving the latent ...READ MORE

Jan 9 in Generative AI by Ashutosh
• 19,200 points
115 views
0 votes
1 answer

Under what conditions should arrow functions be utilized in ECMAScript 6?

Arrow functions in ECMAScript 6 should be ...READ MORE

Jan 10 in Java-Script by Navya
76 views
0 votes
1 answer

How do I merge the properties of two JavaScript objects?

https://www.sitepoint.com/merging-objects-javascript/ You can use either the spread operator ...READ MORE

Jan 10 in Java-Script by Navya
78 views
0 votes
1 answer

What’s your approach for managing stakeholders with conflicting priorities?

Managing stakeholders with conflicting priorities requires clear ...READ MORE

Jan 10 in PMP by Ali
88 views
0 votes
1 answer

How can I retrieve the result of an asynchronous operation?

You can retrieve the result of an ...READ MORE

Jan 10 in Java-Script by Navya
75 views
0 votes
1 answer

What strategies do you use to manage projects with limited resources?

Managing projects with limited resources requires strategic ...READ MORE

Jan 10 in PMP by Sonia
90 views
0 votes
1 answer

What’s your approach when asked to add new deliverables close to the deadline?

When new deliverables are added to the ...READ MORE

Jan 10 in PMP by Priya
87 views
0 votes
1 answer

How do you estimate project costs accurately from the start?

To develop precise cost estimates while accounting ...READ MORE

Jan 10 in PMP by Zaid
88 views
0 votes
1 answer

How do you handle scenarios where team members have overlapping responsibilities?

When members share responsibilities, I make clear ...READ MORE

Jan 10 in PMP by Anu
83 views
0 votes
1 answer

How do you handle project scope changes when they come late in the project?

Handling late project scope changes requires flexibility, ...READ MORE

Jan 10 in PMP by Priya
85 views
0 votes
1 answer

What distinguishes JavaScript from ECMAScript?

Aspect JavaScript ECMAScript Definition A programming language used primarily for web ...READ MORE

Jan 10 in Java-Script by Navya
71 views
0 votes
1 answer

How do I address data imbalance in generative models for text and image generation tasks?

In order to address data imbalance in generative ...READ MORE

Jan 9 in Generative AI by rohit kumar yadav
103 views
+1 vote
2 answers

How do you control and limit data export options for sensitive Power BI reports?

A balanced combination of the different features ...READ MORE

Nov 22, 2024 in Power BI by pooja
• 16,300 points
144 views
0 votes
1 answer

How can I avoid sampling bias in my generative model during inference?

In order to avoid sampling bias in my ...READ MORE

Jan 9 in Generative AI by dhritiman singh
98 views
0 votes
1 answer

How do I fix the gradient penalty implementation in GANs for stability?

To stabilize GAN training, You can implement ...READ MORE

Jan 9 in Generative AI by priyanka
93 views
0 votes
1 answer

How do I fix discriminator overfitting in FastAI’s GAN training?

To fix discriminator overfitting in FastAI's GAN ...READ MORE

Jan 9 in Generative AI by amol shrivastav
88 views
0 votes
1 answer

What strategies can I use to improve sample diversity in a generative model?

To improve sample diversity in a generative ...READ MORE

Jan 9 in Generative AI by shrevani
89 views
0 votes
1 answer

What’s the best way to conduct a post-project review or retrospective?

To carry out an effective post-project review, ...READ MORE

Jan 10 in PMP by Sufi
67 views
0 votes
1 answer

Why does my WGAN in PyTorch fail to converge?

WGANs can fail to converge due to ...READ MORE

Jan 9 in Generative AI by nitin rawat
86 views
0 votes
1 answer

How do I improve token coherence in generative text models that use attention mechanisms?

To improve token coherence in generative text ...READ MORE

Jan 9 in Generative AI by neha guha
87 views
0 votes
1 answer

Why does my model generate inconsistent output in a conditional GAN?

To address this, ensure the conditioning input ...READ MORE

Jan 9 in Generative AI by evanjilin joshep
83 views