Trending questions in Edureka Community

0 votes
0 answers
0 votes
1 answer

How to implement a search box in Angular?

1. Create an Angular Component ng generate component search 2. App ...READ MORE

Dec 4 in Web Development by Navya
56 views
0 votes
1 answer

Are pointers available in JavaScript?

No, there are no pointers in JavaScript. JavaScript ...READ MORE

Dec 4 in Web Development by Navya
51 views
0 votes
1 answer

How do you manage configuration changes in microservices without causing downtime?

It takes a combination of techniques and ...READ MORE

Dec 10 in DevOps Tools by Gagana
• 7,530 points
51 views
0 votes
1 answer

Why does "window is not defined" error occur in Next.js?

"window is not defined" error in Next.js ...READ MORE

Dec 4 in Web Development by navya
46 views
0 votes
1 answer

How can you use CSS variables in your styles?

To define a CSS variable, use the ...READ MORE

Dec 4 in Web Development by Navya
47 views
0 votes
1 answer

How to parse a date in Java?

Using DateTimeFormatter  Example: import java.time.LocalDate; import java.time.format.DateTimeFormatter; public class DateParsing { ...READ MORE

Dec 4 in Web Development by Navya
46 views
0 votes
1 answer
0 votes
1 answer

How do you delete a local branch in Git?

1. Delete a Local Branch (Safe Method) If ...READ MORE

Dec 4 in Web Development by kavya
45 views
0 votes
1 answer

What is the most efficient way to read large file using Node.JS(LTS)?

Using Streams Steps to read a large file ...READ MORE

Dec 4 in Web Development by Navya
45 views
0 votes
1 answer

What practices do you follow to ensure observability in event-driven or serverless architectures?

It takes specific procedures to handle the ...READ MORE

Dec 10 in DevOps Tools by Gagana
• 7,530 points
42 views
0 votes
1 answer

Write a function to create gradient descent updates for a generative adversarial network in TensorFlow.

The function to create gradient descent updates for ...READ MORE

Dec 4 in Generative AI by madhav
61 views
0 votes
1 answer

How do you use TensorFlow’s Keras to create a generative model for image synthesis?

 You can use TensorFlow's Keras to create ...READ MORE

Dec 4 in Generative AI by receptionboy
61 views
0 votes
1 answer

How do you serve static files efficiently using Express.js?

Serving static files effectively using Express.js Use express.static() ...READ MORE

Dec 4 in Web Development by Navya
39 views
0 votes
0 answers
0 votes
0 answers

How can you use tensor slicing to speed up training on large datasets for Generative AI?

Can you explain, using Python programming, how ...READ MORE

Dec 5 in Generative AI by Ashutosh
• 8,790 points
38 views
0 votes
1 answer

How do you integrate a distributed tracing solution into your DevOps workflows?

The following actions are involved in incorporating ...READ MORE

Dec 10 in DevOps Tools by Gagana
• 7,530 points
36 views
0 votes
1 answer

How does a Key Distribution Center (KDC) distribute the session key in symmetric encryption?

A Key Distribution Center (KDC) securely distributes ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
41 views
0 votes
1 answer

How can I optimize training time using mixed-precision with TensorFlow?

You can optimize training time using mixed-precision ...READ MORE

Dec 4 in Generative AI by techgirl
53 views
0 votes
1 answer

How can you center an element vertically using CSS?

Using Flexbox .container { display: flex; ...READ MORE

Dec 4 in Web Development by navya
37 views
0 votes
1 answer

How do you implement multi-GPU training in PyTorch for large-scale generative models?

 You  can implement multi-GPU training in PyTorch ...READ MORE

Dec 4 in Generative AI by magadh
52 views
0 votes
1 answer
0 votes
1 answer

How do you implement model checkpointing in PyTorch while training Generative AI models?

To implement model checkpointing in PyTorch for ...READ MORE

Dec 4 in Generative AI by techboy
51 views
0 votes
1 answer

What are the best practices for cryptography in this scenario?

Here are the Top 5 Best Practices ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
36 views
0 votes
1 answer

How can I pass user identity to a different REST service?

To securely pass user identity between REST ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
35 views
0 votes
1 answer

How can I explain to non-tech friends why "cryptography is good"?

Using relevant examples and highlighting its daily ...READ MORE

Dec 4 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
30 views
0 votes
1 answer

How can you generate audio samples with a pretrained neural net like WaveNet?

To generate audio samples with a pre-trained ...READ MORE

Dec 4 in Generative AI by dhriti singh
43 views
0 votes
1 answer

How can I implement text summarization using a BERT-based model?

You can implement text summarization using a ...READ MORE

Dec 4 in Generative AI by anupmaa
43 views
0 votes
1 answer

What’s the code to generate mel-spectrograms from audio for training Generative AI models?

Here is a concise example of generating mel-spectrograms ...READ MORE

Dec 4 in Generative AI by nidhi jha
39 views
0 votes
1 answer
0 votes
1 answer

How can you combine Power Pivot with Power Query to perform complex data transformations and load the data into Power BI efficiently?

For really complicated transformations using Power Pivot ...READ MORE

Dec 3 in Power BI by pooja
• 8,470 points
54 views
0 votes
0 answers

How to handle browser back button in Angular 12?

How to handle browser back button in ...READ MORE

Dec 4 in Web Development by Nidhi
• 4,940 points
50 views
0 votes
1 answer
0 votes
1 answer

What is your approach to security scanning for open-source dependencies in DevOps?

How to Use Dependency Management Tools to ...READ MORE

Dec 10 in DevOps Tools by Gagana
• 7,530 points
37 views
0 votes
1 answer

What techniques do you use to ensure that Power Pivot data models scale properly as your dataset size grows?

Here are some tips to help maintain ...READ MORE

Dec 3 in Power BI by pooja
• 8,470 points
48 views
0 votes
1 answer

What practices do you follow for container health checks and lifecycle management?

The stability and dependability of containerized applications ...READ MORE

Dec 10 in DevOps Tools by Gagana
• 7,530 points
33 views
0 votes
1 answer

What are the best practices for designing a Power BI user activity dashboard?

Best Practices for Designing Power BI Dashboard ...READ MORE

Dec 3 in Power BI by pooja
• 8,470 points
46 views
0 votes
1 answer

How can I configure and troubleshoot YAML release pipelines in Azure DevOps?

To set up and diagnose Azure DevOps ...READ MORE

Dec 3 in DevOps Tools by Gagana
• 7,530 points
49 views
0 votes
1 answer

What are the key differences between classic release pipelines and YAML pipelines in Azure DevOps?

Traditional Release Pipelines: UI-Based: Developed and controlled using ...READ MORE

Dec 3 in DevOps Tools by Gagana
• 7,530 points
47 views
0 votes
0 answers

How to guard route by user role ?

How to guard route by user role ...READ MORE

Dec 4 in Web Development by Nidhi
• 4,940 points
40 views
0 votes
0 answers

How can you create chainable route handlers for a route path in the Express JS app?

How can you create chainable route handlers ...READ MORE

Dec 4 in Web Development by Nidhi
• 4,940 points
36 views
0 votes
1 answer

How can I improve the performance of Ansible playbooks in large environments?

The following methods can help optimize Ansible ...READ MORE

Dec 3 in DevOps Tools by Gagana
• 7,530 points
41 views
0 votes
1 answer

What encryption and decryption algorithms are used in GSM?

GSM (Global System for Mobile Communications) uses ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
36 views
0 votes
1 answer
0 votes
1 answer

In Veracrypt, which encryption algorithm and hash algorithm should I use?

Choosing the right encryption and hash algorithms ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
24 views
0 votes
1 answer

Are encryption algorithms designed to hinder parallelization, and if so, why?

Encryption algorithms are often designed to resist ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
23 views
0 votes
1 answer

How can passwords be stored in a database so they can be securely retrieved?

Here's a step-by-step approach for securely storing ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
19 views
0 votes
1 answer
0 votes
1 answer

Is there a tool for public key cryptography where the password acts as the private key?

Yes, there are cryptographic tools that allow ...READ MORE

Dec 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 9,600 points
17 views
0 votes
1 answer

How do you handle many-to-many relationships in Power Pivot when designing a data model to ensure correct data aggregation?

Handling the many-to-many relationships is really intelligent ...READ MORE

Dec 2 in Power BI by pooja
• 8,470 points
43 views