Trending questions in Edureka Community

0 votes
1 answer

How do you create dynamic embeddings for domain-specific generative tasks?

To create dynamic embeddings for domain-specific generative ...READ MORE

Dec 31, 2024 in Generative AI by shalini guha
581 views
0 votes
1 answer

How to efficiently store and query chatbot-specific embeddings in a shared Pinecone index?

To efficiently store and query chatbot-specific embeddings ...READ MORE

Dec 31, 2024 in Generative AI by neha meheta
577 views
0 votes
1 answer

What’s the best way to onboard new team members onto a project?

When onboarding new team members, I start ...READ MORE

Dec 31, 2024 in PMP by Priya
591 views
0 votes
2 answers

How do I create a rolling time window in Power BI visuals, such as the past 7 or 30 days?

Create a Date Table: Include a calculated ...READ MORE

Jan 23, 2025 in Power BI by pooja
• 24,450 points
1,023 views
0 votes
0 answers

Why the Something You Know Factor is Considered the Weakest in Authentication?

In authentication systems, the Something You Know factor, ...READ MORE

Jan 2, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
448 views
0 votes
2 answers

How do I create custom tooltips that display different information based on the visual or data point in Power BI?

Custom tooltips: Create a report page dedicated to detailed information and link that to visuals. For ...READ MORE

Jan 23, 2025 in Power BI by anonymous
• 24,450 points
1,028 views
0 votes
1 answer

Why isn't AES-256 with Argon2i-based memory hardening used for at-rest file encryption?

Combining AES-256 encryption with Argon2i key derivation ...READ MORE

Jan 2, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
505 views
0 votes
0 answers

How can you use orchestration tools (like Ansible or Chef) to facilitate DevOps service migration?

How can you use orchestration tools (like ...READ MORE

Dec 12, 2024 in DevOps Tools by Anila
• 5,070 points
1,358 views
0 votes
1 answer

Does PCI DSS require an SAQ for each site?

When managing PCI DSS compliance for a ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
566 views
0 votes
1 answer

How many businesses experienced a Spectre/Meltdown attack?

Even though there aren't exact numbers on ...READ MORE

Nov 29, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,929 views
0 votes
1 answer

How can I troubleshoot a scenario where Power BI loads data with wrong formats or encoding from a CSV file?

Troubleshoot Incorrect Formats or Encoding with CSV ...READ MORE

Dec 30, 2024 in Power BI by Vani
• 3,580 points

edited Mar 6, 2025 1,602 views
0 votes
0 answers

How do you give constructive feedback to underperforming team members?

How do you handle situations where a ...READ MORE

Jan 2, 2025 in PMP by Hoor
• 4,690 points
491 views
+1 vote
2 answers

How to get MS Power BI Data Analyst Associate PL-300 Badge for my Email Signature?

The following instructions explain how to properly ...READ MORE

Oct 24, 2024 in Power BI by pooja
• 24,450 points
2,525 views
0 votes
1 answer

Which command-line tools are recommended for SNMP enumeration?

Effective SNMP enumeration is essential for network ...READ MORE

Dec 19, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,058 views
0 votes
1 answer

What is Jest and react testing library?

They both are tools for testing React ...READ MORE

Dec 31, 2024 in Node-js by Navya
558 views
0 votes
1 answer

What’s your approach for handling project delays caused by external vendors?

Dealing with delays from external vendors is ...READ MORE

Dec 24, 2024 in PMP by Ali
835 views
0 votes
1 answer

How to integrate Data Lake Gen2 ACL-based access in Azure AI Search for secure indexing?

To integrate Azure Data Lake Gen2 ACL-based ...READ MORE

Dec 30, 2024 in Generative AI by shalini guha
568 views
0 votes
1 answer

How do you handle formatting issues when exporting Power BI reports to Excel or PDF, especially with large text tables?

They are as follows: Handle formatting issues ...READ MORE

Dec 18, 2024 in Power BI by anonymous
• 3,020 points

edited Mar 6, 2025 1,970 views
0 votes
2 answers

What are best practices for managing Power BI datasets when dealing with live and import data connections?

You can embed reports into business applications ...READ MORE

Jan 23, 2025 in Power BI by pooja
• 24,450 points
1,039 views
0 votes
1 answer

Is it possible to get the user groups or other attributes with TACACS authentication?

Yes, the TACACS+ (Terminal Access Controller Access-Control ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
779 views
0 votes
1 answer

How can you implement beam search decoding for text generation using TensorFlow?

To implement beam search decoding for text ...READ MORE

Dec 24, 2024 in Generative AI by Shalini guha
825 views
0 votes
0 answers

What are the challenges of moving container orchestration services from Docker Swarm to Kubernetes?

What are the challenges of moving container ...READ MORE

Dec 12, 2024 in DevOps Tools by Anila
• 5,070 points
1,331 views
0 votes
1 answer

How to prevent webpack from renaming js file?

To prevent Webpack from renaming JavaScript files ...READ MORE

Dec 23, 2024 in Java-Script by Navya
940 views
0 votes
1 answer

How do you balance empathy and authority as a project manager?

Balancing empathy and authority requires a thoughtful ...READ MORE

Dec 31, 2024 in PMP by Sufi
540 views
0 votes
1 answer

How can you build a conversational agent using Rasa NLU and generative AI models?

To build a conversational agent that combines ...READ MORE

Dec 23, 2024 in Generative AI by anupam mishra
849 views
0 votes
1 answer

How can specifying task_type improve Vertex AI embeddings in real-time Q&A applications?

Specifying the task type (e.g., "question-answering") when ...READ MORE

Dec 31, 2024 in Generative AI by anupam yadav
518 views
0 votes
1 answer

How to limit the number of digits in an input HTML?

For text-based inputs such as <input type="text"> ...READ MORE

Dec 17, 2024 in HTML by Navya
1,103 views
0 votes
1 answer

How can you utilize model checkpoints in PyTorch to save and resume GAN training?

To save and resume GAN training in ...READ MORE

Jan 3, 2025 in Generative AI by anamika
693 views
+1 vote
1 answer

How do I debug and resolve Python script execution errors in Power BI?

Debugging and solving errors when executing Python ...READ MORE

Dec 18, 2024 in Power BI by pooja
• 24,450 points
1,021 views
0 votes
1 answer

How to validate a digital signature in a PDF?

To validate a digital signature in a ...READ MORE

Nov 13, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,568 views
0 votes
1 answer

How can Google's Gen AI Multi-turn API improve chatbot responses in e-commerce?

Google's Gen AI Multi-turn API can improve ...READ MORE

Dec 30, 2024 in Generative AI by tech boy
535 views
0 votes
1 answer

How do I troubleshoot Power BI visuals that are showing as blank after applying a specific filter?

It is commonly noticed that blank visuals ...READ MORE

Dec 30, 2024 in Power BI by Vani
• 3,580 points

edited Mar 6, 2025 1,554 views
0 votes
1 answer

How can I retrieve search result snippets from a Microsoft Graph API query in a real-time application?

To retrieve search result snippets from a ...READ MORE

Dec 31, 2024 in Generative AI by shri nidhi
505 views
0 votes
1 answer

How is authentication related to the CIA triad?

Authentication is a fundamental component of the ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
706 views
0 votes
1 answer

What is the overarching term for authentication and authorization?

The overarching term that encompasses both authentication ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
705 views
0 votes
1 answer

How do you deploy a Hugging Face model using the transformers and fastapi libraries?

You can deploy a Hugging Face model using ...READ MORE

Nov 29, 2024 in Generative AI by anil limbu
1,870 views
0 votes
1 answer

Why would full disk encryption miss slack space, swap files, and memory?

Full Disk Encryption (FDE) is designed to ...READ MORE

Dec 31, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
505 views
0 votes
1 answer

How can you implement teacher forcing in Keras for training sequence models?

To implement teacher forcing in Keras for ...READ MORE

Dec 26, 2024 in Generative AI by tech didi ji
742 views
0 votes
1 answer

What are Ansible playbooks, and how do they simplify configuration management?

Ansible playbooks define a set of activities ...READ MORE

Dec 19, 2024 in DevOps Tools by Gagana
• 10,070 points
1,325 views
0 votes
2 answers

What’s the best practice for organizing workspace access and security settings in Power BI Service?

Workspaces This is how users are assigned roles as Admin, Member, Contributor, ...READ MORE

Jan 23, 2025 in Power BI by anonymous
• 24,450 points
833 views
0 votes
0 answers

What is the threat model for mobile security when the attacker has root access?

When an attacker gains root access to ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
487 views
0 votes
2 answers

What strategies can help manage data privacy and GDPR compliance in Power BI reports?

Implement row-level security (RLS) to limit data ...READ MORE

Jan 23, 2025 in Power BI by anonymous
• 24,450 points
828 views
0 votes
1 answer

What’s your go-to method for resolving disputes between team members?

When conflicts arise, I focus on understanding ...READ MORE

Dec 31, 2024 in PMP by Anu
494 views
0 votes
1 answer

What are the methods for enumerating FTP users and shares securely?

Methods for FTP User and Share Enumeration Certain ...READ MORE

Nov 20, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,333 views
0 votes
1 answer

How can you use Grafana templating variables to switch between monitoring labels dynamically in real-time?

To use Grafana templating variables to switch ...READ MORE

Dec 31, 2024 in Generative AI by anil murgan
473 views
0 votes
0 answers

How to prevent lookalike domain phishing and secure client-side code against replication?

We’re concerned about phishing attacks using lookalike ...READ MORE

Dec 30, 2024 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
472 views
0 votes
1 answer

How do you manage multi-cloud environments with Terraform?

Terraform's provider-based design may be used to ...READ MORE

Dec 19, 2024 in DevOps Tools by Gagana
• 10,070 points
1,309 views
0 votes
1 answer

How do you determine the right key performance indicators (KPIs) for your project?

Choosing the appropriate KPIs for a project ...READ MORE

Dec 24, 2024 in PMP by Priya
756 views
0 votes
0 answers

How do you delegate tasks effectively as a project manager?

Delegating tasks effectively is crucial for project ...READ MORE

Dec 30, 2024 in PMP by Hoor
• 4,690 points
531 views
0 votes
1 answer

Are there any solutions available that conform to the AAA protocol?

Yes, there are several solutions that conform ...READ MORE

Dec 26, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
704 views