Trending questions in Edureka Community

0 votes
0 answers

How do you prevent output distortion in GPT-2 models when generating technical articles?

With the help of code can i ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,260 points
376 views
0 votes
0 answers
0 votes
0 answers

What steps can be taken to fix dead neurons during training of a text generation model?

Can i know What steps can be ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
372 views
0 votes
1 answer

How do you create protected routes in React?

Creating Protected Routes in React (React Router ...READ MORE

Feb 23 in Node-js by Kavya
691 views
0 votes
0 answers

How do I optimize the batch size for a VAE model to achieve faster convergence with balanced accuracy?

With the help of proper code example ...READ MORE

Feb 22 in Generative AI by Nidhi
• 16,260 points
651 views
0 votes
0 answers
0 votes
1 answer

What is the difference between Hooks and router in React?

Feature Hooks React Router Definition Functions that manage state and side ...READ MORE

Feb 24 in Node-js by Kavya
676 views
0 votes
0 answers

How do you navigate complex approval processes with multiple stakeholders?

I’m working on a project that needs ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
503 views
0 votes
0 answers
0 votes
0 answers

How do phishing attacks lead to identity theft?

Phishing attacks trick users into revealing sensitive ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
337 views
0 votes
0 answers

How would you prioritize tasks when faced with limited resources and tight deadlines?

How do you prioritize tasks when you're ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
283 views
+1 vote
1 answer

What are the recommended ways to transfer data from Power BI to DOMO while maintaining performance and data integrity?

There are approaches to efficiently performing the ...READ MORE

Feb 24 in Power BI by anonymous
• 36,180 points
581 views
0 votes
0 answers

How does a password manager increase security?

Password managers store and generate strong, unique ...READ MORE

Mar 3 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
332 views
0 votes
0 answers

How do you handle over-dependence on a single key team member?

I’m managing a project where one team ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
495 views
0 votes
0 answers

How would you troubleshoot lack of coherence in generated dialogue when using a language model?

Can you tell me How would you ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,260 points
361 views
0 votes
0 answers

How would you handle a situation where the project scope is continuously changing?

How do you handle a situation where ...READ MORE

Mar 5 in PMP by Parshvi
• 7,940 points
278 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

How do you manage team expectations if the project scope is reduced?

How do you keep your team motivated ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
490 views
0 votes
0 answers

How would you handle a sudden rise in project costs due to market changes?

You planned the budget carefully, but then ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
448 views
0 votes
1 answer

What is the use of takeUntil to cancel a subscription?

takeUntil is an RxJS operator used to ...READ MORE

Feb 24 in Node-js by Navya
618 views
0 votes
1 answer

How to pass parameters with react-router?

Passing Parameters with React Router 1. Define a ...READ MORE

Feb 23 in Node-js by Kavya
675 views
0 votes
0 answers

How does network scanning help in security assessments?

Network scanning is used to identify active ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
498 views
0 votes
1 answer

How do you handle a large amount of data in React?

Handling Large Amounts of Data in React To ...READ MORE

Feb 24 in Node-js by Kavya
644 views
0 votes
0 answers

How do you perform feature engineering using PolynomialFeatures in Scikit-learn for regression tasks?

With the help of proper code example ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
348 views
0 votes
1 answer

How can I call an API in Power BI when connected through a VPN?

Challenges When Calling an API via VPN Network ...READ MORE

Feb 27 in Power BI by anonymous
• 36,180 points
473 views
0 votes
0 answers

How would you fix syntax errors when training a transformer model for code generation tasks?

Can you tell me How would you ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
345 views
0 votes
0 answers

What’s your strategy for handling a major data breach during a project?

I'm leading a project, and one of ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
503 views
0 votes
1 answer

Why are initial states undefined in React Native, or what causes this behavior?

In React Native (or React in general), ...READ MORE

Feb 23 in Node-js by Kavya
681 views
0 votes
0 answers

How do DDoS attacks disrupt network services?

DDoS attacks flood a network with traffic, ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
441 views
0 votes
0 answers

How do you optimize resource allocation in a resource-constrained project?

How do you manage a project when ...READ MORE

Feb 27 in PMP by Parshvi
• 740 points
473 views
0 votes
0 answers

How would you resolve underperformance in language models during text generation tasks?

Can you tell me How would you ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
341 views
0 votes
1 answer

How can you configure routing for a multi-page React application using React-Router?

To configure routing for a multi-page React ...READ MORE

Feb 23 in Node-js by Kavya
659 views
0 votes
0 answers

How do you address lack of context when generating email responses using large language models?

Can i know How do you address ...READ MORE

Mar 2 in Generative AI by Nidhi
• 16,260 points
336 views
0 votes
0 answers

How do you handle scenarios where a project faces prolonged resource shortages?

I’m managing a project that’s been dealing ...READ MORE

Feb 26 in PMP by Parshvi
• 740 points
495 views
0 votes
1 answer

Why does React's useState hook use const instead of let?

The useState Hook is typically used with ...READ MORE

Feb 12 in Node-js by Navya
1,118 views
0 votes
0 answers

How do you use TfidfVectorizer in Scikit-learn to transform text data for a classification task?

With the help of proper code can ...READ MORE

Mar 2 in Generative AI by Ashutosh
• 33,350 points
337 views
0 votes
0 answers
0 votes
0 answers

How can I optimize hyperparameters in a lightGBM model for time-series forecasting?

With the help of proper code example ...READ MORE

Feb 22 in Generative AI by Nidhi
• 16,260 points
611 views
0 votes
1 answer

How can you implement forkJoin for multiple API responses aggregation?

In Angular, forkJoin is used to combine ...READ MORE

Feb 24 in Node-js by Navya
591 views
0 votes
1 answer

How would you manage the state between different components of the site?

Method Description Best For Props (Parent to Child) Pass data from ...READ MORE

Feb 24 in Node-js by Kavya
635 views
0 votes
0 answers

How do you maintain engagement in projects with ambiguous timelines?

Some projects stretch on forever, with shifting ...READ MORE

Feb 28 in PMP by Parshvi
• 7,940 points
419 views
0 votes
0 answers
+1 vote
2 answers

How do I incorporate storytelling techniques into a Power BI Fabric report to make data more engaging for non-technical audiences?

Three essential roles will be essential in ...READ MORE

Dec 27, 2024 in Power BI by pooja
• 24,450 points
574 views
0 votes
0 answers

How does a network-based intrusion prevention system secure a network?

A network-based intrusion prevention system (NIPS) monitors ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
413 views
0 votes
1 answer

How does the @Component directive define Angular components?

The @Component decorator defines a component by ...READ MORE

Feb 26 in Angular by Navya
507 views
0 votes
0 answers

What are some common network threats and how do they work?

Networks face various security threats, including malware, ...READ MORE

Feb 28 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
416 views
0 votes
1 answer

What methods are available to force a component to re-render when using React hooks?

Here are the primary methods available to ...READ MORE

Feb 23 in Node-js by Kavya
654 views