Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Differential
Differential Privacy mathematically guarantees query results don't reveal individual records. Used in census, health analytics, tech telemetry for privacy-preserving insights.
Answer: Differential
Differential Privacy adds mathematical noise to model outputs, providing provable privacy guarantees against membership inference and model inversion attacks.
Answer: Code
Security as Code defines policies in declarative format (OPA, Sentinel), enabling version control, testing, automated enforcement. Critical for scalable cloud security governance.
Answer: Application-Layer
Application-layer encryption ensures data remains encrypted even if storage or network layers are compromised. Critical for end-to-end data protection in Zero Trust architectures.
Answer: Prompt
Instruction tuning fine-tunes LLMs on instruction datasets, improving task completion and helpfulness.
Answer: Latency
CDNs distribute content to edge locations near users, reducing latency and origin load.
Answer: Middle
NEP 2020 emphasizes computational thinking, coding, AI exposure from Class 6 onwards.
Answer: Governance
Model registries manage model versions, parameters, metrics, deployment history.
Answer: Parameter
Hyperparameter tuning: grid search, random search, Bayesian optimization. Critical for maximizing performance.
Answer: Masked
Self-supervised learning creates supervisory signals from data structure: mask prediction, next sentence prediction.
Answer: 115BBH
Section 115BBH taxes crypto income at 30% plus cess, with 1% TDS on transactions.
Answer: Cellular / Biological
Cellular computing uses biochemical reactions in cells for parallel computation. Early research stage.
Answer: Aditya
Aditya-L1 positioned at Sun-Earth L1 point for uninterrupted solar observation. Studies coronal heating, CMEs, solar flares for space weather forecasting.
Answer: Molecular / Biochemical
Molecular computing uses DNA, proteins, or cellular processes for massive parallelism. Research stage with potential for ultra-low power, complex problem solving.
Answer: 8000
NM-QTA funds quantum computing, communication, sensing, materials research. Implemented by DST with IITs, IISc participation.
Answer: Purpose
Purpose Limitation prevents function creep by ensuring data is used only as consented. Core principle in GDPR, DPDP Act, and global privacy frameworks.
Answer: Randomized
Randomized smoothing provides certified robustness guarantees against adversarial perturbations by averaging predictions over noisy inputs.
Answer: IaC / Infrastructure as Code
IaC scanning (Checkov, tfsec) analyzes Terraform/CloudFormation for misconfigurations before deployment. Critical for shift-left security in DevOps.
Answer: 800-207
NIST SP 800-207 provides comprehensive Zero Trust guidance: identity verification, device trust, network segmentation, continuous monitoring.
Answer: Chandrayaan
Chandrayaan-3's Vikram lander and Pragyan rover analyzed lunar soil near south pole, searching for water ice and studying surface composition.