Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Semiconductor
India Semiconductor Mission implements ₹76,000 crore incentive scheme for semiconductor fabs, display fabs, ATMP, design ecosystem.
Answer: Tinkering
Atal Tinkering Labs provide makerspaces with tools for students to innovate. Fosters creativity, problem-solving, entrepreneurship from school level.
Answer: ASVS / Application Security Verification Standard
OWASP ASVS provides security requirements and testing guidelines for web applications. Critical for secure software development lifecycle.
Answer: Quantum
Quantum annealing uses quantum tunneling to find global minima in optimization landscapes. Suitable for logistics, finance, machine learning. Different from gate-based quantum computing.
Answer: Tokenization
Tokenization replaces sensitive values with format-preserving tokens, reversible via secure vault. Used in payments, healthcare for PCI-DSS compliance.
Answer: Inversion
Model inversion exploits model outputs to infer sensitive training data attributes. Critical privacy risk for ML systems handling personal data.
Answer: Canary
Canary Release deploys new version to small user subset, monitors metrics, gradually expands if stable. Reduces risk vs big-bang releases.
Answer: SPADEX
SPADEX (Space Docking Experiment) successfully demonstrated autonomous rendezvous and docking of two spacecraft in Earth orbit.
Answer: T-Hub
T-Hub (Telangana) is India's largest innovation campus, connecting startups with corporates, investors, mentors. Supports deep tech, healthtech, enterprise solutions.
Answer: Ka
Ka-band (26.5-40 GHz) offers high bandwidth for satellite broadband but susceptible to rain attenuation. Requires adaptive coding and ground station diversity.
Answer: Board
Data Protection Board of India is independent regulatory body established under DPDP Act 2023 to adjudicate disputes, impose penalties, enforce compliance.
Answer: Differential
Differential Privacy mathematically guarantees that model outputs don't reveal whether specific individuals were in training data. Critical for privacy-preserving ML deployment.
Answer: Breach
Security Breach is an incident where unauthorized access, disclosure, alteration, or destruction of data occurs. Requires immediate containment, investigation, notification (as per laws like DPDP Act 2023), and remediation. Prevention: defense-in-depth, monitoring, incident response planning, and employee training.
Answer: Collaborative
Collaborative Filtering recommends items by analyzing patterns from similar users (user-based) or similar items (item-based). Used by Amazon, Netflix, Spotify. Hybrid systems combine with content-based filtering. Privacy-preserving techniques like federated learning are emerging to protect user data while personalizing recommendations.
Answer: PM-WANI / BharatNet
PM-WANI enables public Wi-Fi hotspots via PDOs for affordable internet access. BharatNet provides fiber backbone to gram panchayats. Combined, they support digital education initiatives like DIKSHA, SWAYAM, and e-Pathshala, bridging the digital divide for rural students during remote learning.
Answer: Dynamic
Dynamic Routing protocols (OSPF, BGP, EIGRP) automatically adjust paths based on network topology changes, congestion, or failures. Unlike static routing (manually configured), dynamic routing scales for large networks and provides redundancy. Essential for internet backbone and enterprise WANs.
Answer: Partitioning
Partitioning divides a physical disk into logical sections (partitions) that can be formatted with different file systems, used for multiple OS installations, or separate data organization. Tools: Disk Management (Windows), fdisk/gparted (Linux). Enables better organization, security, and recovery strategies.
Answer: Access Control
Access Control Models define policies for subject-object interactions: DAC (owner-controlled), MAC (system-enforced labels), RBAC (role-based permissions), ABAC (attribute-based rules). Critical for enforcing least privilege and compliance in enterprise systems. Implemented via IAM solutions and directory services.
Answer: Drone
Drone Logistics uses unmanned aerial vehicles for last-mile delivery, especially in remote/hilly areas with poor road connectivity. India's Drone Rules 2021 facilitate commercial drone operations. Applications: medical supplies, e-commerce, agriculture spraying. Requires airspace management and safety protocols.
Answer: e-NAM
e-NAM (Electronic National Agriculture Market) is an online trading platform connecting APMC mandis across India. Enables transparent price discovery, wider market access, and reduced intermediation for farmers. Integrated with quality assaying, payment settlement, and logistics services for efficient agricultural trade.