Trending questions in Edureka Community

+1 vote
1 answer

How to encrypt an SD card without the original device?

Yes, you can encrypt an SD card ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
55 views
+1 vote
1 answer

How to create a proxy server?

To set up a basic proxy server, ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
54 views
0 votes
1 answer

What project management tools are best for remote teams?

Choosing the right tool depends on your team's ...READ MORE

Nov 8 in PMP by Sufi
65 views
+1 vote
1 answer

How to exploit open ports?

Exploiting open ports is a common attack ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
53 views
0 votes
1 answer

Where can I find custom metadata in Salesforce?

Follow these steps so that you can ...READ MORE

Nov 11 in Cloud Computing by Vineet
65 views
0 votes
1 answer

What techniques help maintain diversity in samples generated by generative models (e.g., GANs, VAEs)?

You can maintain the diversity in samples ...READ MORE

Nov 8 in Generative AI by rahul yadav
64 views
0 votes
1 answer

How do you manage hyperparameter tuning for generative AI models, and what coding frameworks do you use?

You can manage hyperparameter tuning for Generative ...READ MORE

Nov 7 in Generative AI by venu singh
87 views
0 votes
1 answer
0 votes
1 answer

What are some real-world examples of successful Agile projects?

A few real-world examples of successful Agile ...READ MORE

Nov 8 in PMP by sonu
61 views
0 votes
1 answer

How do you manage multiple projects using Microsoft Project?

Managing multiple projects in Microsoft Projects can ...READ MORE

Nov 8 in PMP by Isha
60 views
0 votes
1 answer

What is Infrastructure as Code (IaC)?

IaC is the process of managing and ...READ MORE

Nov 8 in Cloud Computing by Pranathii
66 views
0 votes
1 answer
0 votes
1 answer
0 votes
0 answers

What’s the best way to create dynamic date range filters in Power BI without writing complex DAX code?

What’s the best way to create dynamic ...READ MORE

Nov 6 in Power BI by Evanjalin
• 8,370 points
155 views
0 votes
1 answer

What are the most common Agile metrics and how do you track them?

The most common Agile metrics and how ...READ MORE

Nov 7 in PMP by Anu
74 views
+1 vote
1 answer

How to store passwords in a database?

To securely store passwords in a database, ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
43 views
+1 vote
1 answer
+1 vote
1 answer

What methods can I use in JavaScript to detect and prevent clickjacking attacks?

In order to protect our application against ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
64 views
+1 vote
1 answer
0 votes
1 answer

Jira vs. Trello – which do you prefer for project management?

The choice between Jira and Trello depends ...READ MORE

Nov 7 in PMP by Priya
71 views
0 votes
1 answer

How to solve ModuleNotFoundError: No module named 'azure.ai'?

To fix the "ModuleNotFoundError: No module named ...READ MORE

Nov 11 in Azure by NancyI
228 views
0 votes
1 answer

What are your favorite tools or libraries for generating music with AI?

Top 5 tools for Generating music with ...READ MORE

Nov 8 in Generative AI by amisha devadi
68 views
0 votes
0 answers

What are the different types of cloud deployment models?

Could you help me understand the various ...READ MORE

Nov 7 in Cloud Computing by Priyanka
• 4,500 points
121 views
0 votes
0 answers

What is API gateway in cloud services?

Can someone explain what exactly an API ...READ MORE

Nov 7 in Cloud Computing by Priyanka
• 4,500 points
112 views
0 votes
1 answer

Is the PMI-ACP certification worth pursuing after PMP?

Pursuing PMI-ACP after PMP is valuable if ...READ MORE

Nov 8 in PMP by Vani
47 views
0 votes
1 answer

How do you implement style transfer in generative models, and what coding frameworks or libraries do you use?

In order to implement style transfer in ...READ MORE

Nov 7 in ChatGPT by animesh shrivastav

edited Nov 7 by Ashutosh 69 views
0 votes
1 answer

What is multitenant architecture in Salesforce?

In Salesforce, multitenant architecture refers to a ...READ MORE

Nov 7 in SalesForce by Keerthi
78 views
0 votes
1 answer

What is the difference between a Solution Architect and a Technical Architect?

A Solution Architect designs comprehensive solutions aligned ...READ MORE

Nov 7 in Cloud Computing by Kaveri
136 views
0 votes
1 answer

How do you choose the right project management software?

You can consider the following steps to ...READ MORE

Nov 7 in PMP by soni
66 views
0 votes
1 answer

How can I resolve data type mismatch errors when merging datasets in Power BI?

The mismatched data types are often encountered ...READ MORE

Nov 6 in Power BI by pooja
• 8,470 points
101 views
0 votes
1 answer

How can I resolve the "IN operator is not supported" error when writing DAX queries?

To fix the error “IN operator is ...READ MORE

Nov 7 in Power BI by pooja
• 8,470 points
70 views
0 votes
1 answer

What is Continuous Integration/Continuous Deployment (CI/CD) in cloud?

Continuous Integration (CI) and Continuous Deployment (CD) ...READ MORE

Nov 7 in Cloud Computing by Krishi
66 views
+1 vote
1 answer
0 votes
1 answer

How can I troubleshoot the “A circular dependency was detected” error in complex DAX calculations?

The error message "A circular dependency was ...READ MORE

Nov 7 in Power BI by pooja
• 8,470 points
69 views
0 votes
1 answer
0 votes
1 answer
0 votes
1 answer

How do I calculate a rolling average or cumulative total in Power BI without performance issues?

When working in Power BI, especially with ...READ MORE

Nov 7 in Power BI by pooja
• 8,470 points
67 views
+1 vote
1 answer

How can message-based phishing attacks be detected programmatically?

In order to detect message-based phishing attacks ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
50 views
+1 vote
1 answer

What methods can be employed to scan uploaded files for malware before processing?

In order to effectively scan uploaded files ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
47 views
0 votes
1 answer
0 votes
1 answer

How to find subdomains of a domain?

To enumerate subdomains of a domain, there ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
66 views
+1 vote
1 answer

What coding methods can prevent steganography attacks within image files?

To prevent or detect steganography attacks within ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
47 views
+1 vote
1 answer
+1 vote
1 answer

How can developers detect and block image-based malware in their applications?

To detect and block image-based malware in ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
44 views
0 votes
1 answer

What are cloud-native applications?

Cloud-native applications are designed to run exclusively ...READ MORE

Nov 7 in Cloud Computing by Pammii
63 views
+1 vote
1 answer

What coding practices can help detect unauthorized removable devices connected to a system?

In order to detect unauthorized removable devices ...READ MORE

Nov 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
38 views
0 votes
1 answer

How do I log project management experience for the PMP application?

To log your project management experience for ...READ MORE

Nov 7 in PMP by Diya
54 views
0 votes
0 answers

What is autoscaling in cloud computing?

Can you explain autoscaling to me in ...READ MORE

Nov 8 in Cloud Computing by Priyanka
• 4,500 points
57 views
0 votes
1 answer

How can you handle a click event on a dynamically created element in jQuery?

To handle a click event on a ...READ MORE

Nov 6 in Web Development by kavya
98 views