Trending questions in Edureka Community

0 votes
1 answer

How can you implement static vs. dynamic sharding for TPU datasets?

You can implement static vs dynamic sharding ...READ MORE

Apr 15, 2025 in Generative AI by medha
407 views
0 votes
1 answer

How can I apply different transformations to different subsets of data in Power Query?

Different transformations can be applied to a ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
544 views
0 votes
1 answer

What is the role of event chain methodology (ECM) in dynamic risk management?

Event Chain Methodology (ECM) elevates risk management ...READ MORE

Apr 8, 2025 in PMP by Naira
565 views
0 votes
1 answer

How to customize the default theme in jQuery Mobile CSS Framework?

Manual CSS Overrides Create a custom CSS file ...READ MORE

Apr 7, 2025 in Java-Script by anonymous
580 views
0 votes
0 answers

Propose a method to implement a contextual chatbot using LLamaIndex for customer support.

Can you tell me Propose a method ...READ MORE

Apr 15, 2025 in Generative AI by Ashutosh
• 33,350 points
273 views
0 votes
1 answer

How does the CVSS scoring system classify vulnerabilities?

​The Common Vulnerability Scoring System (CVSS) is ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
456 views
0 votes
1 answer

How does quantization noise affect model performance in QLoRA-tuned models?

You can analyze how quantization noise affects ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,350 points
429 views
0 votes
1 answer

How do you set up custom report automation in Smartsheet Control Center?

Smartsheet Control Center plays a significant role ...READ MORE

Apr 8, 2025 in PMP by Naira
528 views
0 votes
1 answer

How do you configure Zapier integrations for syncing tasks between Trello and Slack?

Zapier allows you to link Trello and ...READ MORE

Apr 8, 2025 in PMP by Naira
530 views
0 votes
1 answer

Why do I keep getting port scan attacks?

Experiencing frequent port scan alerts can be ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
577 views
0 votes
1 answer

How to handle the swiperight event to trigger custom actions in jQuery Mobile?

To handle the swiperight event and trigger ...READ MORE

Apr 10, 2025 in Node-js by anonymous
466 views
0 votes
1 answer

How does Metasploit exploit vulnerabilities?

​Metasploit is a powerful open-source framework developed ...READ MORE

Apr 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
400 views
0 votes
4 answers

How to print objects of class using print function in Python?

You have to called the built in ...READ MORE

May 12, 2021 in Python by anonymous

edited Mar 5, 2025 81,263 views
0 votes
1 answer

How to implement swipe gestures for navigation in jQuery Mobile?

To enable swipe gestures for page navigation ...READ MORE

Apr 7, 2025 in Node-js by anonymous
562 views
0 votes
1 answer

How do you implement per-core tensor broadcasting in TPU systems?

You can implement per-core tensor broadcasting in ...READ MORE

Apr 16, 2025 in Generative AI by simran
369 views
0 votes
1 answer

What are the phases of the vulnerability-management lifecycle?

​The vulnerability management lifecycle is a continuous, ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
439 views
0 votes
1 answer

How would you perform rank tuning in QLoRA for a large language model?

You can perform rank tuning in QLoRA ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,350 points
412 views
0 votes
1 answer

How to measure the impact of dynamic quantization in QLoRA on large datasets?

You can measure the impact of dynamic ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,350 points
411 views
0 votes
0 answers

What are the risks of IPv6 scanning compared to IPv4 scanning?

IPv6 has a much larger address space ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by Nidhi
• 16,260 points
293 views
0 votes
1 answer

How to create a custom directive that integrates with external charting libraries?

Compact Directive for External Chart Integration import { ...READ MORE

Apr 10, 2025 in Angular by anonymous
429 views
0 votes
1 answer

How can GitHub Actions be used for automated Agile reporting in Jira?

GitHub Actions is a powerful workflow automation ...READ MORE

Apr 8, 2025 in PMP by Naira
537 views
0 votes
1 answer

How to lock cells in excel ?

To make a column non-editable: Select the whole ...READ MORE

Oct 18, 2022 in Others by narikkadan
• 86,360 points
39,548 views
0 votes
1 answer

How does NTP enumeration help in DDoS attacks?

​Network Time Protocol (NTP) enumeration involves gathering ...READ MORE

Apr 9, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
474 views
0 votes
1 answer

How can LDAP enumeration be used to extract user details?

​Lightweight Directory Access Protocol (LDAP) is widely ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
517 views
0 votes
1 answer

How can ChatGPT or Copilot AI assist with project documentation generation?

Artificial intelligence solutions such as ChatGPT and ...READ MORE

Apr 8, 2025 in PMP by Naira
510 views
0 votes
1 answer

What’s the best way to implement drag-and-drop task dependencies in Monday.com?

Monday.com's Gantt View and Dependency Column provides ...READ MORE

Apr 8, 2025 in PMP by Naira
529 views
0 votes
0 answers

How would you use LLamaIndex to build a semantic search engine for research papers?

Can you tell me How would you ...READ MORE

Apr 15, 2025 in Generative AI by Ashutosh
• 33,350 points
242 views
0 votes
1 answer

How do I set up automatic deployment of reports across multiple environments?

The adoption of Power BI Deployment Pipelines ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
498 views
0 votes
1 answer

What are the key benefits of quantum project scheduling in high-uncertainty projects?

QPS is an advanced scheduling approach that ...READ MORE

Apr 4, 2025 in PMP by Naira
675 views
0 votes
1 answer

What are ICMP Echo Requests in host discovery?

​ICMP Echo Requests, commonly known as "ping" ...READ MORE

Apr 7, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
552 views
0 votes
1 answer

How do I reduce the impact of large cardinality fields on performance in Power BI?

Measures to mitigate the extent of performance ...READ MORE

Apr 1, 2025 in Power BI by anonymous
• 36,180 points
797 views
0 votes
2 answers

How do you mitigate the risks associated with schedule compression techniques?

Fast-tracking and crashing can help you advance ...READ MORE

Apr 4, 2025 in PMP by Naira
633 views
0 votes
1 answer

How to disable weekends in jQuery UI Datepicker selection?

To disable weekends (Saturdays and Sundays) in ...READ MORE

Apr 7, 2025 in Node-js by anonymous
539 views
0 votes
1 answer

what is devops and test devops

test answer here READ MORE

Mar 19, 2025 in ChatGPT by Megha
• 160 points
1,345 views
0 votes
0 answers

How to create a single-page navigation system using jQuery Mobile?

Can you tell me How to create ...READ MORE

Apr 7, 2025 in Node-js by Nidhi
• 16,260 points
584 views
0 votes
1 answer

What are the best practices to avoid my server being port scanned?

​Port scanning is a technique used by ...READ MORE

Apr 4, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
676 views
0 votes
0 answers

How to handle multiple accordions on a single page with jQuery UI?

Can i know How to handle multiple ...READ MORE

Apr 7, 2025 in Java-Script by Ashutosh
• 33,350 points
584 views
0 votes
1 answer

Why is my favicon not working in my next js app?

If your favicon isn’t working in your ...READ MORE

Apr 3, 2025 in Node-js by anonymous
760 views
0 votes
1 answer

How do I dynamically calculate the first and last transaction date for each customer?

Calculation of the first transaction date and ...READ MORE

Apr 1, 2025 in Power BI by anonymous
• 36,180 points
804 views
0 votes
1 answer

What techniques are used in DNS Cache Snooping?

​DNS Cache Snooping, also known as DNS ...READ MORE

Apr 9, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
455 views
0 votes
1 answer

How can I use a disconnected table to drive multiple visual interactions?

Using a disconnected table in Power BI ...READ MORE

Apr 1, 2025 in Power BI by Evanjalin
• 36,180 points
795 views
0 votes
1 answer

How does IDS detect network scanning?

​Intrusion Detection Systems (IDS) are essential for ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
494 views
0 votes
1 answer

How do I add advanced conditional formatting to a matrix visual based on multiple measures?

To add advanced conditional formatting to a ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
485 views
0 votes
1 answer

How do you set up automated workload balancing in Asana?

Asana's automated workload balancing ensures that team ...READ MORE

Apr 8, 2025 in PMP by Naira
506 views
0 votes
1 answer

How to position jQuery UI Tooltip relative to a specific element on the page?

To position a jQuery UI Tooltip relative ...READ MORE

Apr 7, 2025 in Node-js by anonymous
526 views
0 votes
1 answer

What’s the best way to automate regulatory compliance tracking using GRC tools?

GRC (Governance, Risk, and Compliance) technologies make ...READ MORE

Apr 8, 2025 in PMP by Naira
482 views
0 votes
1 answer

How would you monitor gradient sparsity in QLoRA training?

You can monitor gradient sparsity in QLoRA ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,350 points
371 views
0 votes
1 answer

How does SNMP enumeration expose sensitive data?

​Simple Network Management Protocol (SNMP) is widely ...READ MORE

Apr 8, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
483 views
0 votes
1 answer

What are the risks of VoIP enumeration in enterprises?

​Voice over Internet Protocol (VoIP) enumeration involves ...READ MORE

Apr 9, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
436 views
0 votes
1 answer

How do Markov decision processes (MDP) enhance iterative project risk assessment?

Markov Decision Processes (MDPs) provide an organized ...READ MORE

Apr 8, 2025 in PMP by Naira
469 views