Trending questions in Edureka Community

0 votes
1 answer

How can I create a measure that calculates the weighted average of a column dynamically based on slicer selections?

Using SUMX and DIVIDE in DAX, a ...READ MORE

Mar 10, 2025 in Power BI by anonymous
• 36,180 points
1,309 views
+1 vote
2 answers

How can I leverage R for advanced statistical analysis within Power BI reports?

Leverage R for Advanced Statistical Analysis in ...READ MORE

Jan 23, 2025 in Power BI by anonymous
• 36,180 points
964 views
0 votes
1 answer

How does PCI DSS compliance apply to Memcached usage?

​The Payment Card Industry Data Security Standard ...READ MORE

Mar 27, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
570 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer

Is penetration testing an entry-level job?

​Penetration testing, often referred to as ethical ...READ MORE

Mar 26, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
631 views
0 votes
0 answers

Write a CUDA kernel to accelerate ray sampling for NeRF on the GPU.

With the help of proper code example ...READ MORE

Apr 2, 2025 in Generative AI by Ashutosh
• 33,370 points
351 views
0 votes
0 answers
0 votes
0 answers

Write a program to compare the performance of two foundation models on the GLUE benchmark.

Can i know Write a program to ...READ MORE

Apr 1, 2025 in Generative AI by Nidhi
• 16,260 points
392 views
0 votes
0 answers
0 votes
1 answer

What is the difference between active and passive Digital Footprints?

A digital footprint encompasses the trail of ...READ MORE

Feb 12, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,524 views
+1 vote
1 answer

Why am I unable to set refresh for a web-based anonymous connection in Power BI Server, and how can I resolve it?

Scheduled refresh for web-based data sources that ...READ MORE

Feb 28, 2025 in Power BI by anonymous
• 36,180 points
1,679 views
0 votes
0 answers
0 votes
0 answers
0 votes
0 answers
0 votes
1 answer

Do I need to know C for cybersecurity?

Proficiency in C programming can be highly ...READ MORE

Mar 25, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
662 views
0 votes
1 answer

How can I set up automated deployment of Power BI reports across multiple environments using CI/CD?

Best practices for establishing CI/CD for automatic ...READ MORE

Mar 19, 2025 in Power BI by anonymous
• 36,180 points
886 views
0 votes
0 answers

How can you trust a forensic scientist to have maintained the chain of custody?

Maintaining the chain of custody is essential ...READ MORE

Apr 1, 2025 in Cyber Security & Ethical Hacking by Anupam
• 18,970 points
378 views
0 votes
1 answer

What is the best way to trigger change or input event in react js?

To handle change or input events in ...READ MORE

Feb 22, 2025 in Node-js by Kavya
1,998 views
0 votes
1 answer

Does a Risk Management approach work in Cybersecurity?

A risk management approach is fundamental to ...READ MORE

Mar 28, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
507 views
0 votes
1 answer

How to integrate redux-saga middleware into a React project?

To integrate redux-saga middleware into a React ...READ MORE

Mar 24, 2025 in Node-js by anonymous
781 views
0 votes
0 answers

How can I validate a form that i had created using bootstrap 3?

Can you tell me How can I ...READ MORE

Apr 1, 2025 in Node-js by Ashutosh
• 33,370 points
362 views
0 votes
1 answer

How to automate a vulnerability assessment lifecycle in Python?

Automating a vulnerability assessment lifecycle using Python ...READ MORE

Feb 19, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
2,098 views
0 votes
1 answer

How would you handle class conditional generation in a conditional GAN (CGAN) for creating targeted marketing materials?

Yes, class conditional generation in a Conditional ...READ MORE

Mar 26, 2025 in Generative AI by nitin rawat
589 views
0 votes
1 answer

What’s the best way to handle a difficult project team member?

Addressing conflicts early prevents disruptions. My approach ...READ MORE

Mar 25, 2025 in PMP by Naira
744 views
0 votes
2 answers

What’s the role of business intelligence in project management?

BI enhances decision-making by leveraging data analytics. ...READ MORE

Mar 25, 2025 in PMP by Naira
699 views
0 votes
1 answer

Does HIPAA require database encryption?

​The Health Insurance Portability and Accountability Act ...READ MORE

Mar 28, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
490 views
0 votes
1 answer
0 votes
1 answer

Is AWS S3 PCI compliant?

​Amazon Simple Storage Service (S3) is assessed ...READ MORE

Mar 27, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
519 views
0 votes
1 answer

How to Make a Resizable JavaFX Application with Font and Image Size Constraints?

To create a resizable JavaFX application with ...READ MORE

Mar 10, 2025 in Java-Script by Tanvi
1,254 views
0 votes
1 answer

How can I enable incremental refresh for a dataset with irregular date keys?

To enable incremental refresh for a dataset ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 36,180 points
632 views
0 votes
1 answer

How do I create a donut chart where the segments dynamically change based on multiple user-selected dimensions?

To create a donut chart that updates ...READ MORE

Mar 19, 2025 in Power BI by anonymous
• 36,180 points
860 views
0 votes
1 answer

How do you develop leadership skills as a project manager?

Effective leadership in project management goes beyond ...READ MORE

Mar 25, 2025 in PMP by Naira
715 views
0 votes
1 answer

How to avoid DoS attacks on WiFi?

​Denial-of-Service (DoS) attacks can significantly disrupt Wi-Fi ...READ MORE

Mar 25, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
616 views
+1 vote
7 answers

What is difference between access modifier and access specifier in java

Access Specifier:- This can be understood as ...READ MORE

Feb 14, 2019 in Java by Priyaj
• 58,020 points
82,186 views
0 votes
1 answer

How do you communicate major project changes to stakeholders?

Major project changes must be communicated successfully ...READ MORE

Mar 25, 2025 in PMP by Naira
728 views
0 votes
1 answer

What is used by companies to prevent hackers from accessing the company's computer networks?

​Protecting corporate networks from cyber threats requires ...READ MORE

Mar 26, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
565 views
0 votes
1 answer

I need a scatter plot where the x-axis and y-axis dynamically change based on slicer selections—how can I achieve this?

Create a scatter plot that is going ...READ MORE

Mar 18, 2025 in Power BI by anonymous
• 36,180 points
878 views
0 votes
1 answer

How do you balance Agile flexibility with the need for project governance?

Agile must integrate governance without excessive control. My ...READ MORE

Mar 25, 2025 in PMP by Naira
730 views
0 votes
1 answer

How can I create a multi-row card that dynamically adjusts based on the number of selected values?

To create a multi-row card in Power ...READ MORE

Mar 18, 2025 in Power BI by anonymous
• 36,180 points
872 views
0 votes
1 answer

When can an ethical hacker start the penetration test?

​Before initiating a penetration test, ethical hackers ...READ MORE

Mar 25, 2025 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 31,260 points
603 views
0 votes
1 answer

How can I create a dynamic grouping in Power Query where the group sizes vary based on another column’s values?

You can use these innovative techniques in ...READ MORE

Mar 17, 2025 in Power BI by anonymous
• 36,180 points
915 views
0 votes
1 answer

How can I dynamically create what-if parameters that allow for real-time scenario planning?

To dynamically create what-if parameters in Power ...READ MORE

Mar 24, 2025 in Power BI by anonymous
• 36,180 points
607 views
0 votes
1 answer

How to compare redux-saga and redux-thunk for managing side effects?

To use Redux DevTools to debug async ...READ MORE

Mar 19, 2025 in Node-js by Avni
849 views
0 votes
1 answer

Write a function to detect and filter injection attacks in user prompts sent to an LLM.

Detect and filter injection attacks in LLM ...READ MORE

Mar 25, 2025 in Generative AI by somaya
681 views
0 votes
1 answer

What are the biggest challenges of scaling Agile for large projects?

Scaling Agile beyond small teams presents key ...READ MORE

Mar 25, 2025 in PMP by Naira
716 views
0 votes
1 answer

What are the key benefits of using AI in project management?

AI is transforming project management by automating ...READ MORE

Mar 25, 2025 in PMP by Naira
688 views
0 votes
1 answer

How do I optimize a complex Power Query transformation that takes too long to refresh?

If you want to optimize a very ...READ MORE

Mar 17, 2025 in Power BI by anonymous
• 36,180 points
905 views
0 votes
1 answer

How do you use automation in project management?

Automation streamlines workflows by reducing manual tasks. ...READ MORE

Mar 25, 2025 in PMP by Naira
685 views