Trending questions in Edureka Community

0 votes
0 answers

How do I use GenAI for creating structured data from unstructured customer feedback?

Can you tell me How do I ...READ MORE

Feb 10 in Generative AI by Nidhi
• 16,260 points
415 views
0 votes
1 answer

Can I protect against password hacking just by salting the previous-hash?

Enhancing password security is crucial in safeguarding ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
523 views
0 votes
0 answers
0 votes
1 answer

How can I target the shadow DOM host element only if it’s the last child?

To target the shadow DOM host element ...READ MORE

Feb 10 in Java-Script by Navya
438 views
0 votes
0 answers

How can I resolve an import bug when using Buildzer with Generative AI models?

Can you tell me How can I ...READ MORE

Feb 14 in Generative AI by Ashutosh
• 33,350 points
305 views
0 votes
0 answers

What’s the best approach to build a code generator using GPT models?

With the help of code  can you ...READ MORE

Feb 10 in Generative AI by Nidhi
• 16,260 points
409 views
0 votes
1 answer

How does V8 differ from ECMAScript standards?

Here's a comparison between V8 and ECMAScript ...READ MORE

Feb 10 in Node-js by Navya
431 views
0 votes
1 answer

Why don't we use hash-based digital signatures everywhere?

Hash-based digital signature schemes, such as Lamport ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
486 views
0 votes
1 answer

What is the purpose of getters and setters in ECMAScript 6 classes?

Getters and setters are special functions within ...READ MORE

Feb 10 in Web Development by Navya
413 views
0 votes
1 answer

What is the process to parse JSON using Node.js?

You can parse JSON data using the ...READ MORE

Feb 10 in Node-js by Navya
412 views
0 votes
1 answer

Can a web server be secured with just a firewall?

Relying solely on a firewall to secure ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
446 views
0 votes
0 answers

What role does hyperparameter search play in optimizing Generative AI pipelines?

With the help of proper code example ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 33,350 points
357 views
0 votes
2 answers

How would you implement a FIFO data retention policy for a Power BI dataset?

Implement a FIFO data retention policy in ...READ MORE

Mar 24 in Power BI by anonymous
• 24,450 points
721 views
0 votes
1 answer

What are the negative aspects of creating fake security footprints?

Creating fake security footprints, such as misleading ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
405 views
0 votes
0 answers

How does variational inference improve Generative AI for anomaly detection?

With the help of code and examples ...READ MORE

Feb 12 in Generative AI by Ashutosh
• 33,350 points
308 views
0 votes
1 answer

Why use manual testing for web server attacks if scanners can detect vulnerabilities?

While automated security scanners are valuable tools ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
428 views
0 votes
1 answer

Why trust Nmap's reverse lookup for hostnames during discovery?

Nmap, a widely-used network scanning tool, performs ...READ MORE

Feb 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
410 views
0 votes
0 answers

What are the trade-offs of using FP16 precision for training Generative AI models?

With the help of code can you ...READ MORE

Feb 10 in Generative AI by Nidhi
• 16,260 points
362 views
0 votes
0 answers

How does regularization scaling impact Generative AI for hierarchical task optimization?

With the help of proper code examples, ...READ MORE

Feb 12 in Generative AI by Ashutosh
• 33,350 points
296 views
0 votes
1 answer

How do firewalls handle encrypted traffic?

Firewalls play a crucial role in network ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
387 views
0 votes
0 answers

How to improve word output for hugging face models?

With the help of code, can you ...READ MORE

Feb 14 in Generative AI by Ashutosh
• 33,350 points
251 views
0 votes
0 answers

What are the challenges in embedding large contexts in Generative AI for summarization tasks?

Can you tell me What the challenges ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 33,350 points
331 views
0 votes
0 answers

How do I set up CI/CD pipelines specifically for Generative AI model development?

With the help of code examples, can ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 33,350 points
328 views
0 votes
0 answers

How can federated learning be used to train Generative AI across distributed datasets?

With the help of code can you ...READ MORE

Feb 10 in Generative AI by Nidhi
• 16,260 points
351 views
0 votes
0 answers
0 votes
1 answer

How can I filter an array of objects by specific attributes?

You can use the filter() method. The ...READ MORE

Feb 10 in Java-Script by Navya
360 views
0 votes
0 answers

Are comments obsolete in favor of Generative AI?

Can you tell me if comments are ...READ MORE

Feb 14 in Generative AI by Ashutosh
• 33,350 points
228 views
0 votes
0 answers

How does zero-shot inference improve Generative AI for unseen tasks?

With the help of code can you ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 33,350 points
308 views
0 votes
0 answers

How do time decay models benefit Generative AI for real-time updates?

Can you tell me how time decay ...READ MORE

Feb 11 in Generative AI by Ashutosh
• 33,350 points
301 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers

testing question for logout case, please dont approve it

testing question for logout case, please dont ...READ MORE

Feb 11 in Career Counselling by anonymous

edited Mar 5 328 views
0 votes
2 answers

What steps would you take to optimize a Power BI Desktop connection to a large data warehouse?

Optimize Power BI’s connection to a large ...READ MORE

Mar 24 in Power BI by anonymous
• 24,450 points
652 views
0 votes
1 answer

How to turn off the camera light on a laptop?

Here are general steps and specific instructions ...READ MORE

Nov 28, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
3,536 views
0 votes
1 answer

Why do digital signatures need different algorithms?

Digital signatures are essential in modern cryptography ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
398 views
0 votes
1 answer

How to map a network passively with Wireshark dumps?

Passive network mapping involves analyzing existing network ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
331 views
0 votes
1 answer

Should I allow communication on public networks?

When connecting to public Wi-Fi networks, such ...READ MORE

Feb 13 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
328 views
0 votes
1 answer

How to exploit LDAP injection?

LDAP injection is a security vulnerability that ...READ MORE

Feb 14 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
304 views
0 votes
1 answer

How is the digital certificate sent alongside digital signatures?

When a digital signature is applied to ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
383 views
0 votes
1 answer

Why don't digital signatures reveal the sender’s private key?

Digital signatures are a cornerstone of modern ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
376 views
0 votes
1 answer

How secure is the hashing, salting, and stretching process in this diagram?

Evaluating the security of your password hashing, ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
370 views
0 votes
1 answer

How does salting increase security?

Salting is a fundamental technique in cryptography ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
379 views
0 votes
1 answer

Does a digital certificate contain a private key?

Digital certificates are fundamental components of public ...READ MORE

Feb 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
337 views
0 votes
1 answer

Any reason I shouldn't be salting and hashing before putting through bCrypt?

When implementing password security with bcrypt, it's ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
356 views
0 votes
1 answer

Is salting a hash more secure than encrypting it?

When securing passwords, it's essential to understand ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
336 views
0 votes
1 answer

Would re-salting passwords regularly in-/decrease security?

Regularly re-salting and re-hashing stored passwords—changing the ...READ MORE

Feb 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
327 views
0 votes
2 answers

Can I use a single access token for multiple Power BI Embedded reports?

Yes, you can use a single access ...READ MORE

Mar 24 in Power BI by anonymous
• 36,180 points
527 views