Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Thought
Chain-of-Thought prompting encourages LLMs to generate reasoning steps.
Answer: Clustering
Clustering discovers natural groupings in unlabeled data.
Answer: Serverless
Serverless query engines enable SQL queries on object storage using schema-on-read.
Answer: Stream
Stream processing handles continuous data flows for real-time insights.
Answer: FAME
FAME provides demand incentives for EVs and charging infrastructure.
Answer: Model / Pipeline
Model parallelism splits model layers across devices; pipeline parallelism stages computation. Critical for scaling LLM training.
Answer: Edge
Edge computing processes data near source, reducing round-trip latency to cloud. Critical for IoT, autonomous vehicles.
Answer: UEBA / User and Entity Behavior
UEBA uses ML to establish behavioral baselines and detect anomalies indicating compromised accounts or insider threats.
Answer: Function
Function calling enables LLMs to invoke APIs, run code, query databases for tasks beyond text generation.
Answer: Stream
Stream processing handles continuous data flows for real-time insights: fraud detection, monitoring, personalization.
Answer: Hunting
Threat hunting uses hypotheses, analytics, and analyst expertise to find hidden adversaries. Complements automated detection.
Answer: Privilege
Principle of Least Privilege restricts user/system access rights to only what is essential. Reduces attack surface and limits damage from compromised accounts.
Answer: Penetration
Penetration Testing (ethical hacking) involves authorized simulated cyberattacks to identify security weaknesses before malicious actors exploit them. Types: black-box (no prior knowledge), white-box (full knowledge), gray-box (partial). Conducted by certified professionals (CEH, OSCP). Findings guide remediation and strengthen security posture.
Answer: SSLV
SSLV (Small Satellite Launch Vehicle) is designed for launching mini/micro/nanosatellites (up to 500 kg to LEO) with low cost, minimal infrastructure, and quick turnaround. Features modular design, minimal launch preparations, and flexibility for multiple satellite deployments. Caters to growing global small satellite market and technology demonstrations.
Answer: UNIQUE
UNIQUE constraint enforces that all values in a column (or column combination) are distinct across rows. Unlike PRIMARY KEY, UNIQUE allows NULL values (typically one NULL per column). Used for business keys like email, phone number. Multiple UNIQUE constraints can exist per table, aiding data integrity and query optimization.
Answer: e-Biz / MCA21
MCA21 (Ministry of Corporate Affairs) is an e-governance platform for company incorporation, compliance filings, and statutory services. e-Biz integrates multiple government services for businesses. These platforms reduce paperwork, enable online payments, and provide real-time status tracking, supporting Ease of Doing Business reforms.
Answer: Microservices
Microservices Architecture decomposes applications into small, independent services communicating via APIs. Benefits: independent scaling, technology diversity, fault isolation, and faster deployments. Challenges: distributed system complexity, data consistency, monitoring. Often combined with containers (Docker) and orchestration (Kubernetes) for cloud-native development.
Answer: CERT
CERT-In (Indian Computer Emergency Response Team) is the national nodal agency for responding to cybersecurity incidents. Functions: threat analysis, vulnerability management, incident response, security awareness, and coordination with international CERTs. Operates under Ministry of Electronics and Information Technology (MeitY).
Answer: Gaganyaan
Gaganyaan is ISRO's human spaceflight program to send Indian astronauts to low Earth orbit (~400 km) for 3-7 days. Includes crew module, service module, life support, and crew escape system. Multiple uncrewed test flights precede crewed mission. Represents India's capability in human-rated launch vehicles and space medicine.
Answer: Atomicity
Atomicity is the 'A' in ACID properties. It guarantees that all operations within a transaction succeed as a unit, or none are applied. If any part fails, the entire transaction is rolled back. Critical for maintaining data consistency in banking, inventory, and other mission-critical applications.