Trending questions in Edureka Community

0 votes
1 answer

How to design a pipe that accepts configuration options for flexible transformations?

Angular Pipe Implementation import { Pipe, PipeTransform } ...READ MORE

Apr 17, 2025 in Node-js by anonymous
636 views
0 votes
1 answer

Is there any alternative to Nmap for UDP?

​While Nmap is a widely used tool ...READ MORE

Apr 4, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,127 views
0 votes
0 answers

How does the CVSS vector string define vulnerability severity?

The CVSS vector string represents various risk ...READ MORE

Apr 21, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
434 views
0 votes
1 answer

How can I monitor Power BI Premium capacity usage effectively?

To monitor Power BI Premium capacity usage ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
940 views
0 votes
1 answer

Why is my favicon not working in my next js app?

If your favicon isn’t working in your ...READ MORE

Apr 3, 2025 in Node-js by anonymous
1,208 views
0 votes
1 answer

How do I calculate the percentage contribution of each category while considering multiple slicers?

You can calculate the percentage contribution dynamically ...READ MORE

Mar 25, 2025 in Power BI by anonymous
• 36,180 points
1,546 views
0 votes
1 answer

How to build a directive that conditionally adds elements to the DOM based on API responses?

Structural Directive with API Condition 1. Create the ...READ MORE

Apr 10, 2025 in HTML by anonymous
851 views
0 votes
1 answer

How to build a directive that listens for specific keyboard shortcuts?

You can use the @HostListener decorator to ...READ MORE

Apr 10, 2025 in Angular by anonymous
840 views
0 votes
1 answer

How does MITRE ATT&CK framework help in vulnerability tracking?

The MITRE ATT&CK framework is a comprehensive ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
673 views
0 votes
1 answer

How do firewalls detect and block scanning attempts?

​Firewalls play a crucial role in network ...READ MORE

Apr 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
801 views
0 votes
1 answer

How do I connect Power BI to Google Analytics for advanced marketing insights?

To connect Power BI to Google Analytics ...READ MORE

Apr 16, 2025 in Power BI by anonymous
• 36,180 points
566 views
0 votes
1 answer

What is CVE, and how does it help in vulnerability tracking?

​Common Vulnerabilities and Exposures (CVE) is a ...READ MORE

Apr 10, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
834 views
0 votes
1 answer

Can I build a sprint velocity trend chart in Google Data Studio?

Yes, you can use Google Data Studio ...READ MORE

Apr 15, 2025 in PMP by Naira
609 views
0 votes
1 answer

How do I enable Power BI to read streaming Twitter data for sentiment analysis?

To enable Power BI to read and ...READ MORE

Apr 16, 2025 in Power BI by anonymous
• 36,180 points
556 views
0 votes
1 answer

How do you integrate Miro Boards with Jira for backlog refinement?

Integrating Miro with Jira transforms Agile teams ...READ MORE

Apr 8, 2025 in PMP by Naira
910 views
0 votes
1 answer

How to highlight specific dates with custom styles in jQuery UI Datepicker?

Here's how to highlight specific dates with ...READ MORE

Apr 7, 2025 in Node-js by anonymous
949 views
0 votes
1 answer

How does DNSSEC zone walking expose subdomains?

​DNSSEC (Domain Name System Security Extensions) aims ...READ MORE

Apr 9, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
870 views
0 votes
1 answer

How to use hierarchical dependency injection to provide different service instances?

To use hierarchical dependency injection in Angular ...READ MORE

Apr 17, 2025 in Node-js by anonymous
586 views
0 votes
0 answers

How does React Router manage the browser history, and what are the different approaches available?

With the help of code may i ...READ MORE

Apr 17, 2025 in Node-js by Ashutosh
• 33,370 points
559 views
0 votes
1 answer

How do I troubleshoot refresh failures in Power BI Service that don’t occur in Desktop?

The first step in resolving Power BI ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
898 views
+1 vote
2 answers
0 votes
1 answer

What’s the impact of Theory of Constraints (TOC) in project bottleneck management?

Eliyahu Goldratt invented the Theory of Constraints ...READ MORE

Apr 14, 2025 in PMP by Naira
646 views
0 votes
1 answer

What are countermeasures against VoIP enumeration attacks?

To prevent SIP endpoint and extension enumeration ...READ MORE

Apr 15, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
607 views
0 votes
0 answers

How can you build an LLM API that supports real-time streaming using Server-Sent Events (SSE)?

Can i know How can you build ...READ MORE

Apr 17, 2025 in Generative AI by Ashutosh
• 33,370 points
540 views
0 votes
1 answer

How do I integrate Slack alerts for key milestones using Zapier automation?

Integrating Slack notifications for major milestones with ...READ MORE

Apr 15, 2025 in PMP by Naira
599 views
0 votes
1 answer

How to use multiple pipes to transform and filter arrays in templates?

Chain multiple pipes in Angular templates by ...READ MORE

Apr 17, 2025 in Node-js by anonymous
564 views
0 votes
1 answer

How to implement a directive that auto-saves form data periodically?

To create a directive that automatically saves ...READ MORE

Apr 10, 2025 in Node-js by anonymous
821 views
0 votes
1 answer

How to prepare a VAPT report?

​A Vulnerability Assessment and Penetration Testing (VAPT) ...READ MORE

Apr 11, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
759 views
0 votes
1 answer

What’s the best way to automate issue triaging in Jira Service Management?

Efficient issue triaging in Jira Service Management ...READ MORE

Apr 8, 2025 in PMP by Naira
878 views
0 votes
1 answer

How can AI-powered workload forecasting be configured in Wrike?

Wrike's AI tools are excellent for estimating ...READ MORE

Apr 8, 2025 in PMP by Naira
894 views
0 votes
1 answer

Create a pipeline for end-to-end QLoRA fine-tuning using PyTorch Lightning.

You can create an end-to-end QLoRA fine-tuning ...READ MORE

Apr 14, 2025 in Generative AI by anonymous
• 33,370 points
765 views
0 votes
1 answer

How can AI enhance the accuracy of real-time monitoring in IoT networks?

​Artificial Intelligence (AI) significantly enhances the accuracy ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
618 views
0 votes
1 answer

How is activity sequencing different in Agile vs Waterfall?

Activity sequencing is an important aspect of ...READ MORE

Apr 15, 2025 in PMP by Naira
566 views
0 votes
0 answers

What are the steps to set up a basic routing system in a React application using React Router?

Can you tell me What are the ...READ MORE

Apr 17, 2025 in Node-js by Nidhi
• 16,260 points
522 views
0 votes
1 answer

What is the biggest security concern with SNMP?

​The most critical security risk associated with ...READ MORE

Apr 15, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
573 views
0 votes
1 answer

How do you establish OKR tracking in Notion or ClickUp?

OKRs (Objectives and Key Results) are an ...READ MORE

Apr 15, 2025 in PMP by Naira
569 views
0 votes
1 answer

What’s the best way to visualize cumulative flow diagrams (CFD) in ClickUp Dashboards?

ClickUp enables showing Agile data, although Cumulative ...READ MORE

Apr 8, 2025 in PMP by Naira
887 views
0 votes
1 answer

How does active fingerprinting reveal OS details?

Active OS fingerprinting is a technique used ...READ MORE

Apr 15, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
586 views
0 votes
1 answer

How do I dynamically calculate the first and last transaction date for each customer?

Calculation of the first transaction date and ...READ MORE

Apr 1, 2025 in Power BI by anonymous
• 36,180 points
1,174 views
0 votes
1 answer

What certifications do I need to become a Malware Analyst?

Pursuing specialized certifications can significantly enhance your ...READ MORE

Mar 26, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
1,447 views
+1 vote
2 answers

Why is the "Visual" tab missing in the formatting pane for a custom visual in Power BI?

The custom visual loses the "Visual" tab ...READ MORE

Jan 8, 2025 in Power BI by pooja
• 24,450 points
2,398 views
0 votes
1 answer

How do I create a timeline visualization that shows overlapping events clearly?

Custom visualizations such as Gantt Chart or ...READ MORE

Apr 8, 2025 in Power BI by anonymous
• 36,180 points
859 views
0 votes
1 answer

How to create a structural directive that renders elements based on user permissions?

Here's how to create a structural directive ...READ MORE

Apr 10, 2025 in Node-js by anonymous
795 views
0 votes
1 answer

How does AI detect invasive scanning techniques?

AI enhances network security by detecting invasive ...READ MORE

Apr 15, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
576 views
0 votes
1 answer

How can I resolve issues with calling the Gemini API in an Electron.js application?

To use secure server-side proxy calls to ...READ MORE

Mar 12, 2025 in Generative AI by amrita
2,042 views
0 votes
1 answer

Do firewalls protect against port scanning?

​Yes, firewalls can detect and block port ...READ MORE

Apr 15, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
575 views
0 votes
1 answer

How to use host bindings to bind properties to the host element in a component?

In Angular (2+), the @HostBinding() decorator allows ...READ MORE

Apr 10, 2025 in Node-js by anonymous
791 views
0 votes
1 answer

Can I integrate Confluence meeting notes with my JIRA sprints?

Yes, you can link Confluence meeting notes ...READ MORE

Apr 15, 2025 in PMP by Naira
547 views
0 votes
1 answer

Can't bind to 'ngclass' since it isn't a known property of 'input'?

This error occurs because Angular does not ...READ MORE

Mar 11, 2025 in Java-Script by Tanvi
2,060 views
0 votes
1 answer

What are common false positives in vulnerability scanning?

Vulnerability scanners are essential for identifying potential ...READ MORE

Apr 14, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
598 views