Trending questions in Edureka Community

+1 vote
2 answers

How do you format visuals dynamically based on conditional logic using DAX?

To vary the arrangement of the visuals ...READ MORE

Nov 20, 2024 in Power BI by pooja
• 24,450 points
678 views
0 votes
1 answer

Does a private key always generate the same public key?

Yes, a private key always generates the ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
525 views
0 votes
1 answer

What is the role of the var keyword, and in which situations should it be used or avoided?

In JavaScript, the var keyword is used ...READ MORE

Jan 10 in Java-Script by Navya
442 views
0 votes
1 answer
+1 vote
2 answers

How do I create interactive dashboards that adjust based on user roles or permissions?

When designing interactive dashboards in Power BI ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
717 views
0 votes
1 answer

What are the categories of security control?

Security controls are essential measures implemented to ...READ MORE

Jan 7 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
557 views
0 votes
1 answer

How can I avoid sampling bias in my generative model during inference?

In order to avoid sampling bias in my ...READ MORE

Jan 9 in Generative AI by dhritiman singh
466 views
0 votes
1 answer

What strategies do you use to manage projects with limited resources?

Managing projects with limited resources requires strategic ...READ MORE

Jan 10 in PMP by Sonia
443 views
+1 vote
2 answers

How do you handle JSON data parsing and transformations in Power BI dataflows?

Using Power BI dataflows for parsing and ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
746 views
+1 vote
2 answers

How do you handle duplicate data entries and deduplication logic in Power BI transformations?

Approaching duplicate data elements and formulating deduplication ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
729 views
0 votes
1 answer

Why does my GAN produce a blurry image instead of sharp realistic ones?

To address this, use techniques like using ...READ MORE

Jan 8 in Generative AI by pulkit
507 views
0 votes
1 answer

What is the process for importing a JSON file in ECMAScript 6?

In ECMAScript 6 (ES6), importing a JSON ...READ MORE

Jan 10 in Java-Script by Navya
425 views
0 votes
1 answer

What is collision resistance in a hash function?

Collision resistance is a fundamental property of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
397 views
0 votes
1 answer

How can I prevent overfitting in a generative model trained on limited data?

To prevent overfitting in a generative model ...READ MORE

Jan 8 in Generative AI by chinese boy
506 views
0 votes
1 answer

Why does Nmap show closed ports?

When Nmap reports a port as closed, ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
502 views
0 votes
1 answer

How do I handle batch size adjustments when training large models in Flux?

To handle batch size adjustments when training ...READ MORE

Jan 9 in Generative AI by raju thapa
452 views
0 votes
1 answer

How do I resolve NaN loss values when training a generative model in Julia with Flux?

To resolve NaN loss values when training ...READ MORE

Jan 8 in Generative AI by niya sa
497 views
+5 votes
4 answers

How to execute a python file with few arguments in java?

You can use Java Runtime.exec() to run python script, ...READ MORE

Mar 27, 2018 in Java by DragonLord999
• 8,450 points

edited Nov 7, 2018 by Omkar 85,765 views
0 votes
1 answer

Is HTTP Authorization header encrypted?

When transmitting an HTTP Authorization header over ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
382 views
0 votes
1 answer

What distinguishes JavaScript from ECMAScript?

Aspect JavaScript ECMAScript Definition A programming language used primarily for web ...READ MORE

Jan 10 in Java-Script by Navya
367 views
0 votes
1 answer

How do I improve zero-shot generation using Hugging Face models like GPT-2?

To improve zero-shot generation with Hugging Face ...READ MORE

Jan 9 in Generative AI by madhav kumar
438 views
0 votes
1 answer

How to determine the hashing algorithm of a public key in the certificate?

To determine the hashing algorithm used to ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
487 views
0 votes
1 answer

How do you track project dependencies and avoid bottlenecks?

Tracking project dependencies and avoiding bottlenecks is ...READ MORE

Jan 10 in PMP by Anu
417 views
0 votes
1 answer

How do I implement custom augmentation techniques for image generation?

To implement custom augmentation techniques for image ...READ MORE

Jan 9 in Generative AI by anupam mishra
435 views
0 votes
1 answer

How can I fix the slow inference time when using Hugging Face’s GPT for large inputs?

To fix slow inference time with Hugging ...READ MORE

Jan 8 in Generative AI by balaji shivastava
484 views
0 votes
1 answer

How do I fix discriminator overfitting in FastAI’s GAN training?

To fix discriminator overfitting in FastAI's GAN ...READ MORE

Jan 9 in Generative AI by amol shrivastav
433 views
+1 vote
3 answers

How do I create a flexible date range slicer that allows users to switch between monthly, quarterly, and yearly views?

Proper date hierarchy and dynamic date filters ...READ MORE

Nov 12, 2024 in Power BI by pooja
• 24,450 points
1,240 views
0 votes
1 answer

Why should you not block or close ports in a firewall?

Blocking or closing ports in a firewall ...READ MORE

Jan 8 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
482 views
0 votes
1 answer

How can a multiline string literal be assigned to a variable?

You can use template literals, introduced in ...READ MORE

Jan 10 in Java-Script by Navya
400 views
0 votes
1 answer

Is it possible to build unbreakable Protocol Obfuscation?

Achieving unbreakable protocol obfuscation—where a system is entirely ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
370 views
0 votes
1 answer

What’s your approach for managing stakeholders with conflicting priorities?

Managing stakeholders with conflicting priorities requires clear ...READ MORE

Jan 10 in PMP by Ali
409 views
0 votes
1 answer

How would you manage a project when you have limited visibility into stakeholder priorities?

Project management with less visibility into stakeholder ...READ MORE

Jan 10 in PMP by Anu
406 views
0 votes
1 answer

How do you estimate project costs accurately from the start?

To develop precise cost estimates while accounting ...READ MORE

Jan 10 in PMP by Zaid
407 views
+1 vote
2 answers

What’s the best approach to handle non-tabular data sources (e.g., unstructured data) in Power BI?

Power BI does have certain restrictions when ...READ MORE

Nov 19, 2024 in Power BI by pooja
• 24,450 points
695 views
0 votes
1 answer

How can I resolve shape mismatch errors when feeding data into a Keras VAE?

To resolve shape mismatch errors when feeding ...READ MORE

Jan 8 in Generative AI by neha jha
471 views
0 votes
1 answer

How is the public key included in the CSR?

When creating a Certificate Signing Request (CSR), ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
360 views
0 votes
1 answer

How do I avoid mode dropping when training a conditional GAN for high-resolution images?

In order to avoid mode dropping when training ...READ MORE

Jan 9 in Generative AI by Niraj yadav
420 views
0 votes
1 answer

Why does my Transformer-based text generation model produce incoherent sequences?

Incoherent sequences in Transformer-based text generation models ...READ MORE

Jan 8 in Generative AI by heretechboy
464 views
0 votes
1 answer

Is encryption in HTTPS done by the browser or by the system?

When a browser establishes an HTTPS connection, ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
350 views
0 votes
1 answer

How can I fix the vanishing gradient problem in TensorFlow for GANs?

To fix the vanishing gradient problem in ...READ MORE

Jan 9 in Generative AI by shalini bua
409 views
0 votes
1 answer

Is SSH public key authentication secure?

SSH public key authentication is generally more ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
346 views
0 votes
1 answer

Which SSH key is more secure?

When selecting an SSH key type for ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
345 views
0 votes
1 answer

How Can P2P Systems Recover Compromised Identities Using a Web-of-Trust?

In peer-to-peer (P2P) systems, the Web of ...READ MORE

Jan 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
343 views
0 votes
1 answer

How do I resolve NaN gradients when training GANs in PyTorch?

In order to resolve NaN gradients when ...READ MORE

Jan 7 in Generative AI by anshuman yadav
476 views
0 votes
1 answer

Why does my model generate inconsistent output in a conditional GAN?

To address this, ensure the conditioning input ...READ MORE

Jan 9 in Generative AI by evanjilin joshep
404 views
0 votes
1 answer

How do you deal with unexpected changes in project timelines?

Dealing with the change in project timelines ...READ MORE

Jan 7 in PMP by Sufi
556 views
0 votes
1 answer

What’s the best approach to managing stakeholder expectations?

Effective management of stakeholder expectations is critical ...READ MORE

Jan 7 in PMP by Sonia
554 views
0 votes
1 answer

What are the key success factors for delivering projects on time and within budget?

In my opinion, tight deadlines and low ...READ MORE

Jan 10 in PMP by Gagana
379 views
0 votes
1 answer

How do I merge the properties of two JavaScript objects?

https://www.sitepoint.com/merging-objects-javascript/ You can use either the spread operator ...READ MORE

Jan 10 in Java-Script by Navya
363 views