Trending questions in Edureka Community

0 votes
1 answer

How to determine the hashing algorithm of a public key in the certificate?

To determine the hashing algorithm used to ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
75 views
0 votes
1 answer

How do I resolve NaN gradients when training GANs in PyTorch?

In order to resolve NaN gradients when ...READ MORE

Jan 7 in Generative AI by anshuman yadav
97 views
0 votes
1 answer

How can I fix issues related to model overfitting when training on small generative datasets?

To fix overfitting on small generative datasets, ...READ MORE

Jan 8 in Generative AI by anila k
71 views
0 votes
1 answer

What are the steps to debug incorrect weight initialization in a generative model using a deep learning framework?

To debug incorrect weight initialization in a ...READ MORE

Jan 7 in Generative AI by shalini guha
93 views
0 votes
1 answer
0 votes
1 answer

Why does Nmap show closed ports?

When Nmap reports a port as closed, ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
66 views
0 votes
1 answer

Why should you not block or close ports in a firewall?

Blocking or closing ports in a firewall ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
65 views
0 votes
1 answer

How can I resolve out-of-vocabulary token issues in Hugging Face tokenizers?

To resolve out-of-vocabulary (OOV) token issues in ...READ MORE

Jan 8 in Generative AI by nidhi jha
64 views
0 votes
1 answer
0 votes
1 answer

What’s your method for identifying project risks early on?

As an experienced project manager, identifying project ...READ MORE

Jan 10 in PMP by Anu
98 views
0 votes
1 answer

How do I fix the disconnected loss signal in a CycleGAN implementation?

A disconnected loss signal in a CycleGAN ...READ MORE

Jan 7 in Generative AI by nidhi jha
81 views
0 votes
1 answer

How do I check if a port is open in Nmap?

To check if a specific port is ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
57 views
0 votes
1 answer

What are the steps of risk assessment in information security?

Conducting a comprehensive risk assessment in information ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
98 views
0 votes
1 answer

Is it possible to get a list of services running on an open port?

Yes, it is possible to identify services ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
97 views
0 votes
1 answer

What is IP address conflict with another system on the network?

An IP address conflict occurs when two ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
96 views
0 votes
1 answer

How do I resolve gradient clipping issues in TensorFlow models?

To resolve gradient clipping issues in TensorFlow ...READ MORE

Jan 7 in Generative AI by anmol gupta
77 views
0 votes
1 answer

Why does BART’s generated summary look incomplete after fine-tuning on custom data?

BART's generated summaries may look incomplete after ...READ MORE

Jan 8 in Generative AI by amit singh
52 views
0 votes
1 answer

What are the categories of security control?

Security controls are essential measures implemented to ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
92 views
0 votes
1 answer

Why does my GAN model output blurry images despite using a deep discriminator?

Blurry images in GAN outputs often result ...READ MORE

Jan 7 in Generative AI by megha goyal
68 views
0 votes
1 answer
0 votes
1 answer

How can I fix the tuning of batch normalization layers when training GANs?

To fix tuning issues with batch normalization ...READ MORE

Jan 7 in Generative AI by anupam thapa
65 views
0 votes
1 answer

Are Security Controls Overlapping?

In information security, overlapping controls, where a ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
81 views
0 votes
1 answer

How secure is binding to localhost in order to prevent remote connections?

Binding a server to localhost (127.0.0.1) is ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
80 views
0 votes
1 answer

How to Secure Windows Services with Open Ports Without Compromising Functionality?

Securing Windows services that require open ports ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
78 views
0 votes
1 answer

Why do I get RuntimeError: CUDA out of memory when training a large model on GPU?

The RuntimeError: CUDA out of memory occurs ...READ MORE

Jan 7 in Generative AI by hoor sania
57 views
0 votes
1 answer
0 votes
1 answer

How to Speed Up Nmap SSL Service Detection on Non-Standard Ports?

Scanning for SSL services on non-standard ports ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
70 views
0 votes
1 answer

Are control categories actually exclusive in security?

In information security, controls are commonly categorized ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
69 views
0 votes
1 answer

How do you deal with unexpected changes in project timelines?

Dealing with the change in project timelines ...READ MORE

Jan 7 in PMP by Sufi
126 views
0 votes
1 answer

What’s the best approach to managing stakeholder expectations?

Effective management of stakeholder expectations is critical ...READ MORE

Jan 7 in PMP by Sonia
100 views
0 votes
1 answer

How do you deal with project teams that are resistant to change?

Dealing with resistance to change is not ...READ MORE

Jan 7 in PMP by Ali
92 views
+1 vote
2 answers

What’s the best approach to monitor Power BI dataset refresh failures programmatically?

Programmatically monitoring Power BI dataset refresh failures ...READ MORE

Nov 20, 2024 in Power BI by pooja
• 16,300 points
123 views
+1 vote
2 answers

How do you create interactive slicers with search capabilities for large datasets?

Designing Power BI common data slicers with ...READ MORE

Nov 20, 2024 in Power BI by pooja
• 16,300 points
121 views
0 votes
0 answers

How do you manage the budget in complex projects?

How do you keep the project on ...READ MORE

Jan 6 in PMP by Hoor
• 4,690 points
64 views
+1 vote
2 answers

How do you format visuals dynamically based on conditional logic using DAX?

To vary the arrangement of the visuals ...READ MORE

Nov 20, 2024 in Power BI by pooja
• 16,300 points
106 views
+1 vote
2 answers

How do I create interactive dashboards that adjust based on user roles or permissions?

When designing interactive dashboards in Power BI ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 16,300 points
138 views
+1 vote
2 answers

How do you handle duplicate data entries and deduplication logic in Power BI transformations?

Approaching duplicate data elements and formulating deduplication ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 16,300 points
138 views
0 votes
1 answer

What are the most common project management mistakes to avoid?

Over the years, I’ve encountered several common ...READ MORE

Jan 3 in PMP by Ali
102 views
0 votes
1 answer
0 votes
1 answer

What’s the best way to communicate project delays to stakeholders?

From my perspective, communicating with stakeholders about ...READ MORE

Jan 3 in PMP by Anu
88 views
+1 vote
2 answers

How can I create Power BI visuals that change based on date comparisons (e.g., YOY growth)?

If you want to make visuals in ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 16,300 points
118 views
0 votes
1 answer

Can Power BI’s Copilot feature be used to assist with creating paginated reports or is it limited to interactive reports?

Copilot in Power BI creates interactive reports ...READ MORE

Jan 3 in Power BI by pooja
• 16,300 points
96 views
+1 vote
2 answers

How do you integrate machine learning predictions into Power BI reports using Azure ML?

When it comes to using Azure ML ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 16,300 points
117 views
0 votes
1 answer

How do you track project progress and ensure on-time delivery?

From my experience, what really makes this ...READ MORE

Jan 3 in PMP by Ali
85 views
0 votes
1 answer

Is Backup a Preventive or Corrective Control?

In security frameworks, controls are categorized into ...READ MORE

Jan 3 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 18,160 points
113 views
0 votes
1 answer

How do you prioritize tasks when managing multiple projects?

The ability to multitask in managing projects ...READ MORE

Jan 3 in PMP by Sufi
78 views
0 votes
1 answer
+1 vote
2 answers

What’s the best approach to handle non-tabular data sources (e.g., unstructured data) in Power BI?

Power BI does have certain restrictions when ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 16,300 points
110 views
0 votes
1 answer

How do you ensure quality control in every phase of a project?

Ensuring quality control in every phase of ...READ MORE

Jan 3 in PMP by Sonia
77 views
+1 vote
2 answers

What strategies can help reduce query folding limitations in Power Query for complex data sources?

Though Power Query's query folding is functionally ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 16,300 points
108 views