Trending questions in Edureka Community

0 votes
0 answers

I'm making a Python program to do math, figure out answers, and so on, but I'm getting the syntaxerror: "unexpected character after line continuation character in python."

This is my code: print("Length between sides: "+str((length*length)*2.6)+" ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
563 views
0 votes
0 answers

what is cia triad in cyber security

What does the 'CIA Triad' represent in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
561 views
0 votes
0 answers

what is search engine marketing in digital marketing?

Can someone explain digital marketing wrt to ...READ MORE

Sep 13, 2023 in Digital Marketing by anonymous
• 470 points
274 views
0 votes
0 answers

What is PMP course?

What does the PMP course entail, and ...READ MORE

Sep 13, 2023 in PMP by Saniya
• 3,360 points
274 views
0 votes
1 answer

How do I format date in jQuery datetimepicker?

jquery datepicker format” Code Answer's $('#timePicker'). datetimepicker({ // dateFormat: ...READ MORE

Jun 3, 2022 in JQuery by Edureka
• 13,690 points
20,397 views
0 votes
1 answer

Azure Devops Extension- PublishHTMLReport in Azure pipelines not producing HTML tab in azure devops

It seems like you're facing an issue ...READ MORE

Apr 29 in DevOps on Cloud by anonymous
• 1,420 points
1,184 views
0 votes
0 answers

How to find the number of a list item ?

Given a list ["foo", "bar", "baz"] and ...READ MORE

Sep 11, 2023 in Python by Satyawrat
• 460 points
319 views
0 votes
0 answers

What do the three different types of brackets in Python code mean? I'm not sure if this is right, so if I'm wrong, please tell me:

[] - Normally used for dictionaries, list items () - ...READ MORE

Sep 11, 2023 in Python by Satyawrat
• 460 points
295 views
0 votes
0 answers

what does a cyber security analyst do

What are the primary responsibilities and roles ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
467 views
0 votes
0 answers

what is spear phishing in cyber security

What does the term 'spear phishing' mean ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
456 views
0 votes
0 answers

What is the shortcut key to delete sheet in Excel?

Could someone tell me what is the ...READ MORE

Sep 8, 2023 in Others by Satyawrat
• 460 points
403 views
0 votes
0 answers

What is threat in cyber security

Hi, My company takes cybersecurity very seriously and ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
449 views
0 votes
0 answers

what is information security analyst

What does the role of an information ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
431 views
0 votes
0 answers

How to use the open with statement to open a file

I'm researching file input and output in ...READ MORE

Sep 6, 2023 in Python by Satyawrat
• 460 points
447 views
0 votes
0 answers
0 votes
0 answers

what is data breach in cyber security

What constitutes a 'data breach' within the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
396 views
0 votes
0 answers

what is nist cybersecurity framework

What does the NIST (National Institute of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
396 views
0 votes
0 answers

what is wireshark in cyber security

What is the role and significance of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
393 views
0 votes
0 answers

Shortcut to insert row in excel

What is the Excel shortcut for inserting ...READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
384 views
0 votes
0 answers

what is attack in information security

What is the concept of an 'attack' ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
386 views
0 votes
0 answers

why is computer security important

What are the key reasons for the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
384 views
0 votes
0 answers

What is the extension of MS Excel?

Could someone tell me what is the ...READ MORE

Sep 8, 2023 in Others by Satyawrat
• 460 points
335 views
0 votes
0 answers

how to stop cyber crime

Recently, a member of my family had ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
378 views
0 votes
0 answers

what is threat intelligence in cyber security

What is meant by 'threat intelligence' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
348 views
0 votes
0 answers

what is risk in cyber security

Hello, we are in the process of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
343 views
0 votes
1 answer

How to log data to the Flutter console?

To log data to the Flutter console ...READ MORE

Mar 27, 2023 in Flutter by anonymous
7,373 views
0 votes
0 answers

what is cyber security policy

What does the term 'cybersecurity policy' refer ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
325 views
0 votes
1 answer

How to make flutter app responsive according to different screen size?

To make your Flutter app responsive according ...READ MORE

Mar 27, 2023 in Flutter by anonymous
7,365 views
0 votes
7 answers

docker: executable file not found in $PATH

try to build the image with --no-cache. I ...READ MORE

Nov 1, 2020 in Docker by Deeptesh Agrawal
62,859 views
0 votes
0 answers

I have a very long list of datetime strings like these:

["Jun 1 2005 1:33PM", "Aug 28 1999 ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
321 views
0 votes
0 answers

what is security in information security

What does the term 'security' signify within ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
319 views
0 votes
0 answers

What is function in MS Excel?

What is function in MS Excel? READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
305 views
0 votes
0 answers

How does super() operate in the presence of multiple inheritance? As an example, consider the following:

class First(object): def __init__(self): ...READ MORE

Sep 6, 2023 in Python by Satyawrat
• 460 points
350 views
0 votes
0 answers

what is cyberspace in cyber security

What constitutes 'cyberspace' within the realm of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
305 views
0 votes
0 answers

How to remove formula in excel shortcut

What is the Excel shortcut key for ...READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
297 views
0 votes
0 answers

why do we need cyber security

I'm now enrolled in a course on ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
301 views
0 votes
0 answers

what is cia in cyber security

Hi, According to the OSG, privacy and security ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
300 views
0 votes
0 answers

how criminals plan the attacks in cyber security

Could you provide an in-depth explanation of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
295 views
0 votes
0 answers

what does cybersecurity protect?

Sep 4, 2023 in Cyber Security & Ethical Hacking by Rajarshi
• 470 points
405 views
0 votes
0 answers

what is snort in cyber security

What is the significance of 'Snort' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
276 views
0 votes
0 answers

what is digital marketing strategy?

Sep 6, 2023 in Digital Marketing by anonymous
• 470 points
299 views
0 votes
0 answers

How to sort a dictionary using key?

Example input: {2:3, 1:89, 4:5, 3:0} Desired output: {1:89, 2:3, ...READ MORE

Sep 4, 2023 in Python by Satyawrat
• 460 points
380 views
0 votes
0 answers

Is it okay for general applications to use the RuntimeError exception?

raise RuntimeError('config file is missing host address') I've ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
261 views
0 votes
0 answers

What does %s in a Python format string mean?

For example, in the below code if len(sys.argv) ...READ MORE

Sep 5, 2023 in Python by Satyawrat
• 460 points
339 views
0 votes
0 answers

how does cyber security works

How does the field of cybersecurity operate, ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
231 views
0 votes
0 answers

what is internet marketing?

Sep 6, 2023 in Digital Marketing by anonymous
• 470 points
250 views
0 votes
1 answer

Flutter get context in initState method

To execute code after the widget is ...READ MORE

Mar 27, 2023 in Flutter by anonymous
7,249 views
0 votes
1 answer

How to make a TextField with HintText but no Underline?

You can achieve this by using the ...READ MORE

Mar 21, 2023 in Flutter by Anushi
7,496 views
0 votes
0 answers

How to get pmp certification

Sep 4, 2023 in PMP by Saniya
• 3,360 points
287 views
0 votes
1 answer

casting int to char using C++ style casting [duplicate]

Even though the precision is lost, yo ...READ MORE

Jun 13, 2022 in C++ by Damon
• 4,960 points
19,563 views