Trending questions in Edureka Community

+1 vote
2 answers

What is the pass percentage for pmp exam?

While PMI does not officially publish the ...READ MORE

Oct 21, 2024 in PMP by Vani
803 views
0 votes
1 answer

Are pointers available in JavaScript?

No, there are no pointers in JavaScript. JavaScript ...READ MORE

Dec 4, 2024 in Web Development by Navya
339 views
0 votes
1 answer

How do you deploy a trained PyTorch model on AWS Lambda for real-time inference?

In order to deploy a trained PyTorch ...READ MORE

Nov 29, 2024 in Generative AI by andra boy
554 views
0 votes
1 answer

Is there a tool for public key cryptography where the password acts as the private key?

Yes, there are cryptographic tools that allow ...READ MORE

Dec 3, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
382 views
0 votes
1 answer

Do integrity and authentication always go hand-in-hand, and why?

Integrity and authentication often go hand-in-hand, but ...READ MORE

Dec 5, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
294 views
0 votes
1 answer

How do you write DAX expressions that work well with disconnected tables and slicers?

The best way to maneuver using isolated ...READ MORE

Dec 18, 2024 in Power BI by Vani
• 3,580 points

edited Mar 6 768 views
0 votes
1 answer

How does Terraform compare to other IaC tools like CloudFormation, ARM templates, or Pulumi?

This is how Terraform compares to CloudFormation, ...READ MORE

Dec 2, 2024 in DevOps Tools by Gagana
• 10,070 points
416 views
0 votes
0 answers

What strategies do you use to avoid redundant transformations in Power Query that slow down data refresh?

What strategies do you use to avoid ...READ MORE

Nov 5, 2024 in Power BI by Evanjalin
• 36,180 points
618 views
0 votes
1 answer

What encryption and decryption algorithms are used in GSM?

GSM (Global System for Mobile Communications) uses ...READ MORE

Dec 3, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
377 views
0 votes
1 answer

How can passwords be stored in a database so they can be securely retrieved?

Here's a step-by-step approach for securely storing ...READ MORE

Dec 3, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
375 views
0 votes
1 answer

Is it beneficial to double up or cycle encryption algorithms, and how does it work?

Doubling up or cycling encryption techniques involves using ...READ MORE

Dec 2, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
421 views
0 votes
1 answer

How do you manage and optimize Power Query M code for transforming large datasets?

To optimize Power Query M for big ...READ MORE

Dec 18, 2024 in Power BI by Vani
• 3,580 points

edited Mar 6 762 views
+1 vote
2 answers

How much experience is required for pmp certification?

The experience needed for PMP certification really ...READ MORE

Oct 15, 2024 in PMP by Ali
785 views
0 votes
1 answer

What strategies do you use to fix issues with report filters that don’t apply correctly across all visuals?

Your filter filters concerning discrepancies in your ...READ MORE

Dec 18, 2024 in Power BI by anonymous
• 3,020 points

edited Mar 6 603 views
0 votes
1 answer

What practices do you follow to ensure observability in event-driven or serverless architectures?

It takes specific procedures to handle the ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 10,070 points
318 views
0 votes
1 answer

What techniques do you use to simplify managing complex dependencies for polyglot microservices?

The methods listed below are what I ...READ MORE

Nov 29, 2024 in DevOps Tools by Gagana
• 10,070 points
532 views
0 votes
1 answer

How do you manage complex drill-through reports when users encounter incorrect or missing data in drilldowns?

Power BI reporting involves managing numerous complex ...READ MORE

Dec 18, 2024 in Power BI by anonymous
• 3,020 points

edited Mar 6 596 views
0 votes
1 answer

How to parse a date in Java?

Using DateTimeFormatter  Example: import java.time.LocalDate; import java.time.format.DateTimeFormatter; public class DateParsing { ...READ MORE

Dec 4, 2024 in Web Development by Navya
317 views
0 votes
1 answer

How can you fine-tune a GPT-2 model using a custom dataset for long text generation?

You can fine-tune a GPT-2 model using a ...READ MORE

Nov 29, 2024 in Generative AI by vineet mishra
528 views
0 votes
1 answer

What common mistakes lead to slow report loading times, and how do you fix inefficient M code or DAX queries?

Some of the common reasons leading to ...READ MORE

Dec 18, 2024 in Power BI by anonymous
• 3,020 points

edited Mar 6 611 views
0 votes
1 answer

How can you center an element vertically using CSS?

Using Flexbox .container { display: flex; ...READ MORE

Dec 4, 2024 in Web Development by navya
309 views
0 votes
1 answer

What practices do you follow for container health checks and lifecycle management?

The stability and dependability of containerized applications ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 10,070 points
332 views
0 votes
1 answer

How do you integrate a distributed tracing solution into your DevOps workflows?

The following actions are involved in incorporating ...READ MORE

Dec 10, 2024 in DevOps Tools by Gagana
• 10,070 points
303 views
0 votes
0 answers

How do you troubleshoot slow data model refreshes, especially when custom code (M or DAX) is involved?

How do you troubleshoot slow data model ...READ MORE

Oct 30, 2024 in Power BI by Evanjalin
• 36,180 points
716 views
0 votes
1 answer

Are encryption algorithms designed to hinder parallelization, and if so, why?

Encryption algorithms are often designed to resist ...READ MORE

Dec 3, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
335 views
0 votes
1 answer

How can I pass user identity to a different REST service?

To securely pass user identity between REST ...READ MORE

Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
293 views
0 votes
1 answer

Which encryption algorithms are suitable for different content types?

Yes, the type of content (text, video, ...READ MORE

Dec 2, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
375 views
0 votes
1 answer

How can I implement a hybrid retry strategy combining fixed delays and exponential backoff for HTTP 429 errors?

In order to implement a hybrid retry ...READ MORE

Nov 26, 2024 in Node-js by harsh yadav
619 views
+1 vote
12 answers

Hibernate hbm2ddl.auto possible values and their uses

hibernate.hbm2ddl.auto (e.g. none (default value), create-only, drop, create, create-drop, validate, and update) Setting to perform SchemaManagementTool actions automatically as ...READ MORE

Dec 7, 2018 in Java by Shuvodip
82,097 views
0 votes
1 answer

Are there copyright issues with encryption algorithms?

The legal aspects of encryption algorithms, such ...READ MORE

Dec 2, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
366 views
0 votes
1 answer

How do you ensure effective logging and alerting in multi-cloud environments?

I concentrate on the following tactics to ...READ MORE

Nov 29, 2024 in DevOps Tools by Gagana
• 10,070 points
483 views
0 votes
1 answer

How do I prevent starvation of low-priority tasks when using a retry queue for handling HTTP 429 errors?

To prevent starvation of low-priority tasks in ...READ MORE

Nov 27, 2024 in Node-js by avilash
549 views
0 votes
1 answer

How do you handle dependency conflicts in a monorepo CI/CD pipeline setup?

Effective dependency management is crucial in monorepo ...READ MORE

Dec 5, 2024 in DevOps Tools by Gagana
• 10,070 points
413 views
0 votes
0 answers

What debugging tools or methods do you use to pinpoint and resolve DAX or Power Query coding errors?

What debugging tools or methods do you ...READ MORE

Nov 5, 2024 in Power BI by Evanjalin
• 36,180 points
550 views
–1 vote
1 answer

How can you set up a REST API to serve a generative model using Flask or FastAPI?

 You can set up a REST API ...READ MORE

Nov 29, 2024 in Generative AI by harsh yadav
519 views
0 votes
1 answer

Write code to implement a custom loss function for a GAN in PyTorch.

Here is the code below that you ...READ MORE

Nov 29, 2024 in Generative AI by Ghosla
476 views
0 votes
1 answer

How do you implement a custom data loader for large image datasets in PyTorch?

You can implement a custom data loader for ...READ MORE

Nov 29, 2024 in Generative AI by harsh yadav
472 views
0 votes
1 answer

Why are there so many different encryption algorithms?

The diversity of encryption algorithms exists because ...READ MORE

Dec 2, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
343 views
+1 vote
2 answers

what is the eligibility criteria for pmp certification?

Before applying, ensure you meet one of ...READ MORE

Dec 30, 2024 in PMP by Sania
• 490 points
711 views
+1 vote
1 answer

How to enable vertical scroll bar on David Bacci's Deneb Gantt Chart?

Suppose you're using the Deneb Gantt Chart ...READ MORE

Oct 29, 2024 in Power BI by pooja
• 24,450 points
914 views
0 votes
1 answer

How do I handle prompt fatigue when working with AI models over extended sessions?

To handle prompt fatigue during extended AI ...READ MORE

Dec 12, 2024 in Generative AI by safak nirawar
959 views
0 votes
1 answer

What’s the code to train a deep convolutional GAN (DCGAN) for generating realistic images?

Here is the code you can use to ...READ MORE

Nov 29, 2024 in Generative AI by harsh yadav
454 views
0 votes
1 answer

How to send a password-protected email?

Sending a password-protected email is a great ...READ MORE

Nov 28, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
501 views
0 votes
0 answers

How do you handle data type mismatches or conversion errors in Power Query when merging or appending tables?

How do you handle data type mismatches ...READ MORE

Oct 30, 2024 in Power BI by Evanjalin
• 36,180 points
652 views
0 votes
1 answer

How do you code the denoising process for a diffusion model in PyTorch?

You can code the denoising process for ...READ MORE

Nov 29, 2024 in Generative AI by techboy
452 views
0 votes
1 answer

Why does "undefined" get added to the URL path in Node.js?

It usually indicates an issue in the ...READ MORE

Nov 19, 2024 in Web Development by kavya
897 views
0 votes
1 answer

How do you implement tokenization using Hugging Face's AutoTokenizer for a GPT model?

 In order to implement tokenization using Hugging ...READ MORE

Nov 28, 2024 in Generative AI by nidhi jha
485 views
0 votes
1 answer

How can I write code to generate images using a pretrained GAN model in PyTorch?

 You can use a pre-trained GAN model ...READ MORE

Nov 29, 2024 in Generative AI by aniboy

edited Dec 4, 2024 by Ashutosh 468 views
0 votes
1 answer

How to fix the missing dependency warning when using the useEffect React Hook?

The missing dependency warning in React's useEffect ...READ MORE

Nov 27, 2024 in Web Development by kavya
552 views
0 votes
1 answer

How to clear router history?

The process of clearing your router's history ...READ MORE

Nov 29, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
447 views