Trending questions in Edureka Community

0 votes
0 answers

How do you balance speed with quality in project execution?

How do you strike the right balance ...READ MORE

Mar 18, 2025 in PMP by Parshvi
• 7,940 points
490 views
0 votes
0 answers

What is the difference between NIST and NIST 800-53?

NIST provides cybersecurity standards and frameworks, including ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
439 views
0 votes
0 answers

How to use generator functions in redux-saga for retry logic?

With the help of code can you ...READ MORE

Mar 19, 2025 in Node-js by Ashutosh
• 33,360 points
447 views
0 votes
1 answer

How can I implement a nested if-else statement in ReactJS JSX?

You can use ternary operators or by ...READ MORE

Mar 12, 2025 in Node-js by Sahil
702 views
0 votes
1 answer

How to Center a Single-Column Div Within a 12-Column Container in Bootstrap 3?

Using Bootstrap's Offset Classes Bootstrap 3 provides offset ...READ MORE

Mar 11, 2025 in Node-js by Tanvi
746 views
0 votes
1 answer

What’s the best way to index my SQL database to speed up DirectQuery performance in Power BI?

Here's a demo of some effective indexing ...READ MORE

Mar 11, 2025 in Power BI by anonymous
• 36,180 points
740 views
0 votes
0 answers

using Attention mechanisms in Tensorflow Seq2Seq native API (v1.3)

Can you help me by using Attention ...READ MORE

Mar 19, 2025 in Generative AI by Nidhi
• 16,260 points
439 views
+1 vote
2 answers

How can I extract embedded Excel data from PowerPoint slides for analysis?

Make Extraction of Embedded Excel Data from ...READ MORE

Jan 8, 2025 in Power BI by pooja
• 24,450 points
1,067 views
0 votes
1 answer

How to install Jest and React Testing Library in TypeScript?

To install and configure Jest and React ...READ MORE

Mar 6, 2025 in Java-Script by Anvi
962 views
0 votes
0 answers

Which OWASP Top 10 IoT vulnerability category deals with poorly protected passwords?

The OWASP IoT Top 10 highlights key ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
436 views
0 votes
0 answers

What’s the best way to handle dependencies between project tasks?

What’s the best way to manage task ...READ MORE

Mar 18, 2025 in PMP by Parshvi
• 7,940 points
477 views
0 votes
1 answer
0 votes
0 answers

How do you communicate risks to stakeholders effectively?

How do you communicate risks to stakeholders ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
522 views
0 votes
0 answers

How do you ensure alignment between project goals and business objectives?

How do you make sure a project’s ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
520 views
0 votes
0 answers
0 votes
0 answers

How do you integrate project management tools with existing workflows?

I want to start using project management ...READ MORE

Mar 19, 2025 in PMP by Parshvi
• 7,940 points
423 views
0 votes
1 answer

How to add an attention mechanism in keras?

An attention mechanism in Keras can be ...READ MORE

Mar 17, 2025 in Generative AI by meheta
586 views
0 votes
1 answer

Stacking in Displaying Self Attention weights in a bi-LSTM with attention mechanism

Stacking in displaying self-attention weights in a ...READ MORE

Mar 17, 2025 in Generative AI by Ashutosh
• 33,360 points
473 views
0 votes
0 answers

How do you deal with unexpected external risks (e.g., regulatory changes, economic shifts)?

How do you deal with unexpected risks, ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
514 views
0 votes
1 answer

How does Babel differ from JSX?

Feature Babel JSX Definition A JavaScript compiler that transforms ES6+ code ...READ MORE

Mar 12, 2025 in Java-Script by Sahil
686 views
0 votes
0 answers

How do you estimate project timelines accurately?

How do you estimate project timelines accurately ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
513 views
0 votes
1 answer

I need to compute a year-over-year (YoY) growth rate but only for months where I have data in both years—how do I do this?

Calculating Year-over-Year (YoY) growth only for those ...READ MORE

Mar 10, 2025 in Power BI by anonymous
• 36,180 points
775 views
0 votes
1 answer

Attention mechanism for sequence classification (seq2seq tensorflow r1.1)

To implement an attention mechanism for sequence ...READ MORE

Mar 17, 2025 in Generative AI by nihongio
574 views
0 votes
0 answers

How do you manage a project where stakeholders have conflicting priorities?

How do you handle situations where different ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
499 views
0 votes
1 answer

Haystack PipelineConnectError: Cannot connect 'replies_to_query.output' with 'bm25_retriever.query'

The PipelineConnectError in Haystack when using a ...READ MORE

Mar 17, 2025 in Generative AI by rupesh singh
579 views
0 votes
1 answer

Why isn't my h3 element content matching with the array contents?

Your <h3> element content might not match ...READ MORE

Mar 12, 2025 in Generative AI by radhikha
686 views
0 votes
0 answers

How to create an action creator that dispatches multiple actions during an async operation?

With the help of programming can you ...READ MORE

Mar 19, 2025 in Node-js by Ashutosh
• 33,360 points
424 views
0 votes
1 answer

How to cancel HTTP request in Angular 8?

In Angular 8, you can cancel an ...READ MORE

Feb 26, 2025 in Angular by Kavya
1,284 views
0 votes
0 answers

What are the best reporting tools for project tracking?

Keeping track of project progress is crucial, ...READ MORE

Mar 19, 2025 in PMP by Parshvi
• 7,940 points
404 views
0 votes
0 answers

How do IoT security tools detect rogue devices?

Unauthorized IoT devices on a network can ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
407 views
0 votes
0 answers

Can a password cracker reverse engineer my generation method?

Password crackers use various techniques to break ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
410 views
0 votes
0 answers

How does IoT firmware analysis expose vulnerabilities?

Analyzing IoT firmware helps identify security flaws ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
410 views
0 votes
1 answer

How can you work with an object in React Hooks' useState?

In React Hooks, useState can store and ...READ MORE

Mar 12, 2025 in Node-js by Tanvi
668 views
0 votes
1 answer

Attention mechanism in spelling correction model

An attention mechanism in a spelling correction ...READ MORE

Mar 17, 2025 in Generative AI by anupam mishra
565 views
0 votes
1 answer

How can I use LangChain and Google Gemini Pro to extract and store embeddings of PDF content in Pinecone?

You can use LangChain with Google Gemini ...READ MORE

Mar 12, 2025 in Generative AI by namit
688 views
0 votes
0 answers

What strategies do you use to build trust with project stakeholders?

How do you build and maintain trust ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
483 views
0 votes
1 answer

How do I create an optimized star schema for Power BI when dealing with high-cardinality dimensions?

Here are a few tips to properly ...READ MORE

Mar 11, 2025 in Power BI by anonymous
• 36,180 points
708 views
0 votes
0 answers

How do you handle data scarcity when generating realistic outputs in data-hungry applications?

With the help of code can you ...READ MORE

Mar 20, 2025 in Generative AI by Ashutosh
• 33,360 points
366 views
0 votes
0 answers

What methods protect CoAP-based IoT devices?

The Constrained Application Protocol (CoAP) is used ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
404 views
0 votes
0 answers

What factors do you consider when selecting a project methodology (Agile, Waterfall, etc.)?

What factors help you decide whether to ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
492 views
0 votes
0 answers

What are the biggest challenges in initiating a new project?

What are some of the biggest challenges ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
490 views
0 votes
0 answers

What are the best OT security tools for intrusion detection?

Detecting threats in OT environments requires specialized ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
396 views
0 votes
1 answer

How can I install the Babel plugin for JSX syntax?

Use the following commands: npm install @babel/preset-react --save-dev Steps ...READ MORE

Mar 12, 2025 in Node-js by Sahil
655 views
0 votes
0 answers

What is Artificial Intelligence ?

What is Artificial Intelligence ? and what ...READ MORE

Mar 20, 2025 in Generative AI by Rajeswari
• 140 points
357 views
0 votes
1 answer

How can I animate list items when they are added or removed in Angular?

In Angular, you can animate list items ...READ MORE

Mar 11, 2025 in Angular by Tanmay
696 views
0 votes
1 answer

How to handle asynchronous actions in Redux with Redux-Saga for complex data fetching scenarios?

To handle asynchronous actions in Redux for ...READ MORE

Mar 10, 2025 in Node-js by Tanvi
743 views
0 votes
0 answers

How do you handle a situation where risk mitigation efforts fail?

What would you do if your risk ...READ MORE

Mar 17, 2025 in PMP by Parshvi
• 7,940 points
479 views
0 votes
0 answers

How can IoT threat modeling prevent cyber attacks?

Threat modeling helps identify and mitigate security ...READ MORE

Mar 19, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,960 points
390 views