Trending questions in Edureka Community

0 votes
0 answers

what is risk management in cyber security

What does 'risk management' entail within the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
563 views
0 votes
0 answers

what is search engine marketing in digital marketing?

Can someone explain digital marketing wrt to ...READ MORE

Sep 13, 2023 in Digital Marketing by anonymous
• 470 points
256 views
0 votes
0 answers

What is PMP course?

What does the PMP course entail, and ...READ MORE

Sep 13, 2023 in PMP by Saniya
• 3,360 points
264 views
0 votes
0 answers

I'm making a Python program to do math, figure out answers, and so on, but I'm getting the syntaxerror: "unexpected character after line continuation character in python."

This is my code: print("Length between sides: "+str((length*length)*2.6)+" ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
524 views
0 votes
0 answers

what is cia triad in cyber security

What does the 'CIA Triad' represent in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
518 views
0 votes
1 answer

Azure Devops Extension- PublishHTMLReport in Azure pipelines not producing HTML tab in azure devops

It seems like you're facing an issue ...READ MORE

Apr 29 in DevOps on Cloud by anonymous
• 1,380 points
1,159 views
0 votes
0 answers

How to find the number of a list item ?

Given a list ["foo", "bar", "baz"] and ...READ MORE

Sep 11, 2023 in Python by Satyawrat
• 460 points
299 views
0 votes
0 answers

What do the three different types of brackets in Python code mean? I'm not sure if this is right, so if I'm wrong, please tell me:

[] - Normally used for dictionaries, list items () - ...READ MORE

Sep 11, 2023 in Python by Satyawrat
• 460 points
279 views
0 votes
0 answers

what is spear phishing in cyber security

What does the term 'spear phishing' mean ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
432 views
0 votes
0 answers

what does a cyber security analyst do

What are the primary responsibilities and roles ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
421 views
0 votes
0 answers

What is the shortcut key to delete sheet in Excel?

Could someone tell me what is the ...READ MORE

Sep 8, 2023 in Others by Satyawrat
• 460 points
371 views
0 votes
0 answers

What is threat in cyber security

Hi, My company takes cybersecurity very seriously and ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
395 views
0 votes
1 answer

How do I format date in jQuery datetimepicker?

jquery datepicker format” Code Answer's $('#timePicker'). datetimepicker({ // dateFormat: ...READ MORE

Jun 3, 2022 in JQuery by Edureka
• 13,690 points
20,255 views
0 votes
0 answers

what is information security analyst

What does the role of an information ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
382 views
0 votes
0 answers

How to use the open with statement to open a file

I'm researching file input and output in ...READ MORE

Sep 6, 2023 in Python by Satyawrat
• 460 points
412 views
0 votes
0 answers

what is wireshark in cyber security

What is the role and significance of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
370 views
0 votes
0 answers

what is data breach in cyber security

What constitutes a 'data breach' within the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by siri
• 180 points
369 views
0 votes
0 answers
0 votes
0 answers

What is the extension of MS Excel?

Could someone tell me what is the ...READ MORE

Sep 8, 2023 in Others by Satyawrat
• 460 points
320 views
0 votes
0 answers

Shortcut to insert row in excel

What is the Excel shortcut for inserting ...READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
348 views
0 votes
0 answers

why is computer security important

What are the key reasons for the ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
351 views
0 votes
0 answers

what is attack in information security

What is the concept of an 'attack' ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
348 views
0 votes
0 answers

what is nist cybersecurity framework

What does the NIST (National Institute of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
340 views
0 votes
0 answers

how to stop cyber crime

Recently, a member of my family had ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
327 views
0 votes
0 answers

what is threat intelligence in cyber security

What is meant by 'threat intelligence' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
314 views
0 votes
0 answers

what is risk in cyber security

Hello, we are in the process of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
307 views
0 votes
0 answers

How does super() operate in the presence of multiple inheritance? As an example, consider the following:

class First(object): def __init__(self): ...READ MORE

Sep 6, 2023 in Python by Satyawrat
• 460 points
340 views
0 votes
0 answers

what is cyber security policy

What does the term 'cybersecurity policy' refer ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
294 views
0 votes
0 answers

How to remove formula in excel shortcut

What is the Excel shortcut key for ...READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
285 views
0 votes
0 answers

What is function in MS Excel?

What is function in MS Excel? READ MORE

Sep 7, 2023 in Others by anonymous
• 990 points
284 views
0 votes
0 answers

what is security in information security

What does the term 'security' signify within ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
287 views
0 votes
0 answers

I have a very long list of datetime strings like these:

["Jun 1 2005 1:33PM", "Aug 28 1999 ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
284 views
0 votes
0 answers

what is cia in cyber security

Hi, According to the OSG, privacy and security ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
280 views
0 votes
0 answers

why do we need cyber security

I'm now enrolled in a course on ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
277 views
0 votes
0 answers

what is cyberspace in cyber security

What constitutes 'cyberspace' within the realm of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
274 views
0 votes
0 answers

how criminals plan the attacks in cyber security

Could you provide an in-depth explanation of ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Edureka
• 320 points
264 views
0 votes
0 answers

what is digital marketing strategy?

Sep 6, 2023 in Digital Marketing by anonymous
• 470 points
290 views
0 votes
1 answer

How to make flutter app responsive according to different screen size?

To make your Flutter app responsive according ...READ MORE

Mar 27, 2023 in Flutter by anonymous
7,294 views
0 votes
0 answers

Is it okay for general applications to use the RuntimeError exception?

raise RuntimeError('config file is missing host address') I've ...READ MORE

Sep 7, 2023 in Python by Satyawrat
• 460 points
249 views
0 votes
0 answers

what does cybersecurity protect?

Sep 4, 2023 in Cyber Security & Ethical Hacking by Rajarshi
• 470 points
366 views
0 votes
0 answers

How to sort a dictionary using key?

Example input: {2:3, 1:89, 4:5, 3:0} Desired output: {1:89, 2:3, ...READ MORE

Sep 4, 2023 in Python by Satyawrat
• 460 points
346 views
0 votes
0 answers

what is snort in cyber security

What is the significance of 'Snort' in ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
234 views
0 votes
1 answer

How to log data to the Flutter console?

To log data to the Flutter console ...READ MORE

Mar 27, 2023 in Flutter by anonymous
7,264 views
0 votes
0 answers

how does cyber security works

How does the field of cybersecurity operate, ...READ MORE

Sep 7, 2023 in Cyber Security & Ethical Hacking by Arun
• 300 points
221 views
0 votes
0 answers

What does %s in a Python format string mean?

For example, in the below code if len(sys.argv) ...READ MORE

Sep 5, 2023 in Python by Satyawrat
• 460 points
300 views
0 votes
0 answers

what is internet marketing?

Sep 6, 2023 in Digital Marketing by anonymous
• 470 points
238 views
0 votes
7 answers

docker: executable file not found in $PATH

try to build the image with --no-cache. I ...READ MORE

Nov 1, 2020 in Docker by Deeptesh Agrawal
62,711 views
0 votes
0 answers

How to get pmp certification

Sep 4, 2023 in PMP by Saniya
• 3,360 points
276 views
0 votes
0 answers

what is pmp certification

Sep 4, 2023 in PMP by Saniya
• 3,360 points
199 views
0 votes
0 answers

Why is digital marketing important in 2023?

I have been trying to know about ...READ MORE

Aug 31, 2023 in Digital Marketing by Rajarshi
• 470 points
341 views