Trending questions in Edureka Community

0 votes
1 answer

How can asymmetric encryption be applied to user data to allow unauthenticated input?

Asymmetric encryption can be effectively applied to ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
80 views
0 votes
1 answer

Can ML-KEM be used for purposes other than exchanging AES-GCM keys?

Yes, ML-KEM (Message-Locked Key Encapsulation Mechanism) can ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
76 views
0 votes
1 answer

How do you manage configuration changes in microservices without causing downtime?

It takes a combination of techniques and ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 7,690 points
113 views
0 votes
1 answer

Which Power BI connectors are optimal for tracking user activities across various platforms?

To seamlessly access and analyze tracking user ...READ MORE

Dec 5, 2024 in Power BI by pooja
• 12,450 points
62 views
0 votes
1 answer

Do integrity and authentication always go hand-in-hand, and why?

Integrity and authentication often go hand-in-hand, but ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
73 views
0 votes
0 answers

When should I use dotnet publish over dotnet build in my CI/CD workflow?

When should I use dotnet publish over ...READ MORE

Dec 6, 2024 in DevOps Tools by Anila
• 5,040 points
69 views
0 votes
1 answer

How to create a donut with rounded edges in one direction and a white border between segments?

You can use CSS and conic-gradient for ...READ MORE

Dec 4, 2024 in Web Development by navya
114 views
0 votes
0 answers

What are the steps for migrating Power BI collections to Power BI Embedded?

What are the steps for migrating Power ...READ MORE

Dec 5, 2024 in Power BI by Evanjalin
• 12,810 points
94 views
0 votes
1 answer

How can I get a 12-byte authentication tag in AES-GCM?

To generate a 12-byte (96-bit) authentication tag ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
65 views
0 votes
1 answer

Why does "window is not defined" error occur in Next.js?

"window is not defined" error in Next.js ...READ MORE

Dec 4, 2024 in Web Development by navya
100 views
0 votes
1 answer

How to implement a search box in Angular?

1. Create an Angular Component ng generate component search 2. App ...READ MORE

Dec 4, 2024 in Web Development by Navya
96 views
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer

Are pointers available in JavaScript?

No, there are no pointers in JavaScript. JavaScript ...READ MORE

Dec 4, 2024 in Web Development by Navya
93 views
0 votes
1 answer

Why don't React-router URLs work when refreshing or writing manually?

Below is a just and complete account ...READ MORE

Dec 12, 2024 in Web Development by Navya
85 views
0 votes
1 answer

Write a function to create gradient descent updates for a generative adversarial network in TensorFlow.

The function to create gradient descent updates for ...READ MORE

Dec 4, 2024 in Generative AI by madhav
110 views
0 votes
1 answer

What practices do you follow to ensure observability in event-driven or serverless architectures?

It takes specific procedures to handle the ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 7,690 points
89 views
0 votes
1 answer

How do you delete a local branch in Git?

1. Delete a Local Branch (Safe Method) If ...READ MORE

Dec 4, 2024 in Web Development by kavya
87 views
0 votes
1 answer

How do you use TensorFlow’s Keras to create a generative model for image synthesis?

 You can use TensorFlow's Keras to create ...READ MORE

Dec 4, 2024 in Generative AI by receptionboy
104 views
0 votes
1 answer

How does a Key Distribution Center (KDC) distribute the session key in symmetric encryption?

A Key Distribution Center (KDC) securely distributes ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
90 views
0 votes
0 answers

How can you use tensor slicing to speed up training on large datasets for Generative AI?

Can you explain, using Python programming, how ...READ MORE

Dec 5, 2024 in Generative AI by Ashutosh
• 16,740 points
85 views
0 votes
1 answer

How do you implement multi-GPU training in PyTorch for large-scale generative models?

 You  can implement multi-GPU training in PyTorch ...READ MORE

Dec 4, 2024 in Generative AI by magadh
103 views
0 votes
1 answer

How do you implement model checkpointing in PyTorch while training Generative AI models?

To implement model checkpointing in PyTorch for ...READ MORE

Dec 4, 2024 in Generative AI by techboy
101 views
0 votes
1 answer

What is the most efficient way to read large file using Node.JS(LTS)?

Using Streams Steps to read a large file ...READ MORE

Dec 4, 2024 in Web Development by Navya
83 views
0 votes
1 answer

How do you integrate a distributed tracing solution into your DevOps workflows?

The following actions are involved in incorporating ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 7,690 points
79 views
0 votes
1 answer

How can you use CSS variables in your styles?

To define a CSS variable, use the ...READ MORE

Dec 4, 2024 in Web Development by Navya
80 views
0 votes
1 answer

How can I optimize training time using mixed-precision with TensorFlow?

You can optimize training time using mixed-precision ...READ MORE

Dec 4, 2024 in Generative AI by techgirl
96 views
0 votes
1 answer

How to parse a date in Java?

Using DateTimeFormatter  Example: import java.time.LocalDate; import java.time.format.DateTimeFormatter; public class DateParsing { ...READ MORE

Dec 4, 2024 in Web Development by Navya
78 views
0 votes
1 answer
0 votes
0 answers
0 votes
1 answer

How can I explain to non-tech friends why "cryptography is good"?

Using relevant examples and highlighting its daily ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
75 views
0 votes
1 answer

How can you combine Power Pivot with Power Query to perform complex data transformations and load the data into Power BI efficiently?

For really complicated transformations using Power Pivot ...READ MORE

Dec 3, 2024 in Power BI by pooja
• 12,450 points
108 views
0 votes
1 answer

How can I pass user identity to a different REST service?

To securely pass user identity between REST ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
73 views
0 votes
1 answer

How can you center an element vertically using CSS?

Using Flexbox .container { display: flex; ...READ MORE

Dec 4, 2024 in Web Development by navya
69 views
0 votes
1 answer

What are the best practices for cryptography in this scenario?

Here are the Top 5 Best Practices ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
71 views
0 votes
1 answer

How can you generate audio samples with a pretrained neural net like WaveNet?

To generate audio samples with a pre-trained ...READ MORE

Dec 4, 2024 in Generative AI by dhriti singh
81 views
0 votes
1 answer

What’s the code to generate mel-spectrograms from audio for training Generative AI models?

Here is a concise example of generating mel-spectrograms ...READ MORE

Dec 4, 2024 in Generative AI by nidhi jha
81 views
0 votes
1 answer

In Veracrypt, which encryption algorithm and hash algorithm should I use?

Choosing the right encryption and hash algorithms ...READ MORE

Dec 3, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
106 views
0 votes
1 answer

What techniques do you use to ensure that Power Pivot data models scale properly as your dataset size grows?

Here are some tips to help maintain ...READ MORE

Dec 3, 2024 in Power BI by pooja
• 12,450 points
101 views
0 votes
1 answer

How do you serve static files efficiently using Express.js?

Serving static files effectively using Express.js Use express.static() ...READ MORE

Dec 4, 2024 in Web Development by Navya
59 views
0 votes
1 answer

How can I configure and troubleshoot YAML release pipelines in Azure DevOps?

To set up and diagnose Azure DevOps ...READ MORE

Dec 3, 2024 in DevOps Tools by Gagana
• 7,690 points
103 views
0 votes
1 answer

What is your approach to security scanning for open-source dependencies in DevOps?

How to Use Dependency Management Tools to ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 7,690 points
84 views
0 votes
1 answer

What are the key differences between classic release pipelines and YAML pipelines in Azure DevOps?

Traditional Release Pipelines: UI-Based: Developed and controlled using ...READ MORE

Dec 3, 2024 in DevOps Tools by Gagana
• 7,690 points
102 views
+1 vote
2 answers

how many attempts for pmp exam?

Once your PMP exam application is approved, ...READ MORE

Oct 23, 2024 in PMP by Anu
296 views
0 votes
1 answer

What practices do you follow for container health checks and lifecycle management?

The stability and dependability of containerized applications ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 7,690 points
81 views
0 votes
1 answer
0 votes
1 answer

How can I improve the performance of Ansible playbooks in large environments?

The following methods can help optimize Ansible ...READ MORE

Dec 3, 2024 in DevOps Tools by Gagana
• 7,690 points
97 views
0 votes
1 answer

What are the best practices for designing a Power BI user activity dashboard?

Best Practices for Designing Power BI Dashboard ...READ MORE

Dec 3, 2024 in Power BI by pooja
• 12,450 points
92 views
0 votes
1 answer

How can I implement text summarization using a BERT-based model?

You can implement text summarization using a ...READ MORE

Dec 4, 2024 in Generative AI by anupmaa
71 views
0 votes
0 answers

How to handle browser back button in Angular 12?

How to handle browser back button in ...READ MORE

Dec 4, 2024 in Web Development by Nidhi
• 7,560 points
83 views