Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Reinforcement
Reinforcement Learning (RL) trains agents to make sequential decisions by interacting with an environment and receiving rewards/penalties. Used in robotics, game playing (AlphaGo), autonomous vehicles, and resource optimization. Differs from supervised learning (labeled data) and unsupervised learning (pattern discovery).
Answer: Patch
Patch Management is the process of acquiring, testing, and installing code changes (patches) to fix security vulnerabilities, bugs, or improve functionality. Critical for protecting systems from exploits targeting known flaws. Automated tools and scheduled maintenance windows help streamline patch deployment.
Answer: Fourth
The Fourth Industrial Revolution (Industry 4.0) blends technologies like AI, IoT, robotics, 3D printing, and biotechnology, blurring lines between physical, digital, and biological domains. India's initiatives like SAMARTH Udyog and National Strategy on AI aim to harness this transformation for inclusive growth.
Answer: NAT
NAT (Network Address Translation) allows multiple devices on a private network to share a single public IP address when accessing the internet. Conserves IPv4 addresses and adds a layer of security by hiding internal network structure. Implemented in routers and firewalls.
Answer: SWAYAM
SWAYAM (Study Webs of Active-Learning for Young Aspiring Minds) is a MOOC platform offering free online courses from 9th grade to post-graduation by reputed Indian institutions. Credits earned can be transferred to academic records. Part of Digital India's education transformation initiatives.
Answer: Responsible
Responsible AI encompasses principles and practices to ensure AI systems are developed and deployed ethically: fairness (avoiding bias), accountability (clear responsibility), transparency (explainable decisions), privacy protection, and human oversight. India's AI strategy emphasizes Responsible AI for inclusive growth.
Answer: Worm
Computer Worm is standalone malware that self-replicates to spread across networks, exploiting vulnerabilities without requiring user action (unlike viruses that need host files). Worms can consume bandwidth, install backdoors, or deliver payloads. Prevention: network segmentation, patching, firewall rules.
Answer: Machine
Machine Learning enables systems to learn patterns from data and improve performance on tasks without explicit programming. Types: Supervised (labeled data), Unsupervised (pattern discovery), Reinforcement (reward-based learning). Applications: recommendation engines, fraud detection, predictive maintenance.
Answer: AePS
AePS (Aadhaar Enabled Payment System) allows bank customers to use Aadhaar number and fingerprint/iris for basic banking transactions at Micro-ATMs through Business Correspondents. Operated by NPCI, it promotes financial inclusion in rural areas without need for cards, phones, or internet.
Answer: ROM
ROM (Read-Only Memory) is non-volatile memory that stores firmware like BIOS/UEFI. Data is written during manufacturing and generally cannot be modified by users. Unlike RAM which is volatile, ROM retains critical boot instructions even after power loss. Variants include PROM, EPROM, EEPROM.
Answer: Coherence
Coherence time (T1 for energy relaxation, T2 for phase decoherence) determines how many quantum operations can be performed before errors dominate. Longer coherence enables more complex algorithms. Improved via better materials, shielding, and error correction. Critical metric for comparing quantum hardware platforms.
Answer: Closed-loop / Feedback
Closed-loop control continuously compares desired vs actual state (via sensors) and adjusts actuators to minimize error. Contrasts with open-loop (no feedback). Essential for precision tasks: assembly, welding, autonomous navigation. PID controllers are common implementation. Critical for robotics control theory questions.
Answer: Topology
Topology optimization uses algorithms to distribute material optimally within design constraints (loads, boundaries), creating lightweight, efficient structures often with organic shapes. Enabled by additive manufacturing which can produce complex geometries impossible with subtractive methods. Critical for aerospace, automotive, and biomedical applications.
Answer: Tokenization
Tokenization represents ownership of physical/digital assets (real estate, art, commodities) as blockchain tokens, enabling fractional ownership, instant settlement, and global liquidity. Requires legal frameworks and oracle services for real-world data. Pilots in India for land records, supply chain, and financial assets. Important for fintech innovation questions.
Answer: Uncertainty / Observer
Heisenberg's Uncertainty Principle states that certain pairs of properties (position/momentum) cannot be simultaneously measured with arbitrary precision. In quantum computing, measurement collapses superposition to a definite state, limiting information extraction. Critical for understanding quantum measurement and algorithm design.
Answer: Vision
Computer Vision enables robots to interpret visual data: object recognition, depth estimation, navigation, and manipulation. Combines deep learning (CNNs), sensor fusion, and real-time processing. Critical for autonomous vehicles, warehouse robots, and service robots. Key enabler of intelligent automation systems.
Answer: SLA
SLA (Stereolithography) uses a UV laser to selectively cure photopolymer resin layer by layer, producing high-resolution parts with smooth surfaces. Used for prototypes, dental models, and jewelry. Post-curing and support removal required. One of the earliest additive manufacturing technologies, foundational for resin-based printing.
Answer: Work
Proof of Work (PoW) requires miners to expend computational power to solve hash puzzles, securing the network and preventing double-spending. Energy-intensive; alternatives include Proof of Stake (PoW's successor in Ethereum), Proof of Authority, and Byzantine Fault Tolerance variants. Critical for understanding blockchain security and sustainability.
Answer: NFTs
NFTs (Non-Fungible Tokens) are blockchain-based tokens representing unique digital or physical assets: art, collectibles, virtual land, avatars. Unlike cryptocurrencies (fungible), each NFT has distinct value and metadata. Enable true digital ownership and creator royalties in metaverse economies. Important for digital economy questions.
Answer: Shor's
Shor's Algorithm (1994) factors integers in polynomial time on a quantum computer, threatening RSA encryption which relies on factoring difficulty. Requires fault-tolerant quantum computers not yet available. Grover's Algorithm provides quadratic speedup for unstructured search. Critical for cryptography and quantum advantage questions.