Trending questions in Edureka Community

0 votes
1 answer

What are the best enumeration countermeasures?

​Enumeration attacks involve malicious actors systematically probing ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,280 points
725 views
0 votes
1 answer

Write a script to log validation perplexity during QLoRA training.

You can log validation perplexity during QLoRA ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,370 points
695 views
0 votes
1 answer

What’s the best way to use REST APIs for syncing data between Jira and SAP ERP?

Jira-SAP ERP integration enhances the alignment between ...READ MORE

Apr 8, 2025 in PMP by Naira

reshown Apr 8, 2025 by Neelam 798 views
0 votes
1 answer

How does AI predict attack vectors in enumeration?

​AI enhances cybersecurity by predicting potential attack ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,280 points
550 views
0 votes
0 answers

How do I generate real-time dashboards in Monday.com for stakeholder reporting?

I’m trying to build real-time dashboards in ...READ MORE

Apr 14, 2025 in PMP by Parshvi
• 7,940 points
565 views
0 votes
1 answer

What’s the best way to track critical chain project management (CCPM) using Smartsheet?

Tracking CCPM with Smartsheet requires some setup, ...READ MORE

Apr 8, 2025 in PMP by Naira
823 views
0 votes
1 answer

What’s the best way to use automated speech-to-text meeting minutes in Otter.ai for Agile teams?

Using Otter.ai for Agile teams may greatly ...READ MORE

Apr 8, 2025 in PMP by Naira

reshown Apr 8, 2025 by Neelam 794 views
0 votes
1 answer

Can you explain three-point estimation with real examples in IT projects?

Three-point estimation is a strategy for estimating ...READ MORE

Apr 15, 2025 in PMP by Naira
499 views
0 votes
1 answer

How to implement a directive that adds tooltips to form controls dynamically?

Custom Tooltip Directive 1. Create the Directive import { ...READ MORE

Apr 10, 2025 in Angular by anonymous
708 views
0 votes
1 answer

How do you generate real-time project analytics using Google Looker Studio?

Google Looker Studio’s role in lightweight analytics ...READ MORE

Apr 8, 2025 in PMP by Naira
787 views
0 votes
1 answer
0 votes
0 answers

Selenium Project : Support

Hi I have knowledge in Selenium and ...READ MORE

Apr 9, 2025 in Selenium by RICHA
• 140 points
805 views
0 votes
0 answers

How to Implement a 4-bit quantization strategy using bitsandbytes for efficient inference.

Can you tell me How to Implement ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
477 views
0 votes
1 answer

How can Monte Carlo simulations be applied for project risk forecasting in @Risk for Excel?

Monte Carlo simulations are one of the ...READ MORE

Apr 8, 2025 in PMP by Naira
810 views
0 votes
0 answers
0 votes
0 answers

Implement a Python script to connect an LLM with a FAISS-based vector store.

With the help of code can you ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
471 views
0 votes
0 answers

How would you preprocess a multi-lingual dataset for fine-tuning an LLM while preserving special tokens?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
516 views
0 votes
0 answers

How to Implement a flash attention module for a Transformer model in PyTorch.

May i know How to Implement a ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
470 views
0 votes
1 answer

How do attackers bypass SNMP security restrictions?

​Attackers can bypass SNMP (Simple Network Management ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,280 points
529 views
0 votes
1 answer

What are the implications of incomplete retrospectives on team performance?

Retrospectives are an important Agile ceremony that ...READ MORE

Apr 15, 2025 in PMP by Naira
471 views
+1 vote
1 answer

What are the different ways to integrate Bloomberg data into Power BI, and what challenges should I expect?

Integrating Bloomberg financial data into Power BI ...READ MORE

Feb 27, 2025 in Power BI by anonymous
• 36,180 points
2,516 views
0 votes
1 answer

How can you embed Agile KPIs into a project dashboard?

Adding Agile Key Performance Indicators (KPIs) to ...READ MORE

Apr 15, 2025 in PMP by Naira
468 views
0 votes
1 answer

Create a function for custom parameter initialization in QLoRA fine-tuning.

You can create a custom parameter initialization ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,370 points
664 views
0 votes
1 answer

How can I use parameters to control API calls dynamically in Power Query?

Power Query can manage API calls dynamically ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
773 views
0 votes
1 answer

How can I create a Power BI heatmap that dynamically adjusts based on filters?

Filters can dynamically affect the Power BI ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
772 views
0 votes
0 answers

Write a Python script to implement a byte pair encoding (BPE) tokenizer from scratch.

With the help of code can i ...READ MORE

Apr 16, 2025 in Generative AI by Ashutosh
• 33,370 points
457 views
0 votes
1 answer

How to handle form submissions asynchronously in jQuery Mobile applications?

To effectively manage asynchronous form submissions in ...READ MORE

Apr 7, 2025 in Java-Script by anonymous
808 views
0 votes
1 answer

How do I convert semi-structured Excel files into a relational format for Power BI?

For semi-structured Excel files that have to ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
770 views
0 votes
0 answers

Write a Python server that streams LLM responses using WebSockets.

Can you Write a Python server that ...READ MORE

Apr 16, 2025 in Generative AI by Nidhi
• 16,260 points
451 views
0 votes
1 answer

How can spoofing attacks be prevented?

​Spoofing attacks involve impersonating trusted entities to ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,280 points
508 views
0 votes
1 answer

How to implement grid layouts with nested columns in jQuery Mobile?

The most effective way to implement nested ...READ MORE

Apr 7, 2025 in Node-js by anonymous
801 views
0 votes
1 answer

How to manage component lifecycle hooks for resource cleanup?

You manage component lifecycle hooks—especially ngOnDestroy()—to perform ...READ MORE

Apr 10, 2025 in Node-js by anonymous
697 views
0 votes
0 answers

Write a script to map the embeddings of two LLMs with different tokenizer vocabularies.

Can i know Write a script to ...READ MORE

Apr 15, 2025 in Generative AI by Ashutosh
• 33,370 points
494 views
0 votes
1 answer

How to create a directive that validates input fields based on regex patterns?

You can define a custom directive that ...READ MORE

Apr 10, 2025 in Node-js by anonymous
696 views
0 votes
1 answer

Why do I keep getting port scan attacks?

Experiencing frequent port scan alerts can be ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,280 points
803 views
0 votes
0 answers
0 votes
1 answer

What are the best use cases for AI-powered chatbots in Project Portfolio Management (PPM)?

AI chatbots may be a useful digital ...READ MORE

Apr 8, 2025 in PMP by Naira
753 views
0 votes
1 answer

How do I configure Power BI Service to use DirectQuery efficiently?

In order to optimize DirectQuery in the ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
744 views
0 votes
1 answer

How to develop a directive that restricts user input based on custom conditions?

To create an Angular directive that restricts ...READ MORE

Apr 10, 2025 in Node-js by anonymous
688 views
0 votes
1 answer

Does hacking require a lot of math?

​The role of mathematics in hacking and ...READ MORE

Mar 25, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,280 points
1,377 views
0 votes
0 answers

How to implement speculative decoding for a multi-turn chatbot using a small draft model.

Can you tell me How to implement ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
480 views
0 votes
1 answer

How does Nessus perform vulnerability assessments?

​Nessus, developed by Tenable, is a widely ...READ MORE

Apr 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,280 points
622 views
0 votes
0 answers

Develop a generative AI system that reviews Python code and suggests optimizations.

Can you tell me Develop a generative ...READ MORE

Apr 16, 2025 in Generative AI by Nidhi
• 16,260 points
425 views
0 votes
1 answer

How does IDS detect network scanning?

​Intrusion Detection Systems (IDS) are essential for ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,280 points
743 views
0 votes
1 answer

How to create responsive tables using jQuery Mobile?

The most reliable and maintainable method for ...READ MORE

Apr 7, 2025 in Node-js by anonymous
777 views
0 votes
1 answer

What’s the best way to track sprint velocity trends using Domo?

Domo's approach to sprint velocity tracking allows ...READ MORE

Apr 8, 2025 in PMP by Naira
732 views
0 votes
1 answer

What role does SMB enumeration play in ransomware attacks?

​Server Message Block (SMB) enumeration is a ...READ MORE

Apr 9, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,280 points
698 views
0 votes
1 answer

How does AI automate enumeration attacks?

​Artificial Intelligence (AI) has revolutionized the landscape ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,280 points
655 views
0 votes
1 answer

How to implement a directive that toggles element visibility with animations?

Custom Directive with Angular Animations 1. Define the ...READ MORE

Apr 10, 2025 in Node-js by anonymous
668 views
0 votes
0 answers

In a chatbot system, how can KV caching be optimized to reduce redundant computations?

With the help of code can i ...READ MORE

Apr 15, 2025 in Generative AI by Nidhi
• 16,260 points
464 views