Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: All of these
Effective tech policy: technology-neutral (focus on outcomes), proportionate to risks, adaptable to innovation. Balances consumer protection with innovation incentives. Critical for policy design.
Answer: Multiple Imputation
Multiple imputation creates several completed datasets with different plausible values for missing data, analyzing each and combining results. Accounts for uncertainty vs single imputation methods.
Answer: Refactor
Refactor (re-architect) redesigns applications for cloud-native: microservices, serverless, containers. Maximizes cloud benefits but requires significant effort. Critical for digital transformation.
Answer: Multi-Task
Multi-task learning shares representations across related tasks, improving sample efficiency and generalization. Critical for building versatile AI systems with limited labeled data per task.
Answer: RAG
Retrieval-Augmented Generation (RAG) combines LLMs with external knowledge retrieval, reducing hallucinations by grounding responses in verified sources. Critical for factual accuracy in enterprise AI applications.
Answer: Transformer
Transformer architecture (Vaswani et al., 2017) uses self-attention mechanisms to process sequences in parallel, enabling scaling to billions of parameters. Foundation for GPT, BERT, LLaMA, and other LLMs. Critical for understanding modern AI systems.
Answer: Computer Vision
Computer Vision enables machines to interpret and understand visual information from the world using cameras and AI algorithms. Applications include facial recognition, medical imaging analysis, autonomous vehicles, quality inspection, and augmented reality. Combines deep learning, image processing, and pattern recognition.
Answer: 4.0
Industry 4.0 (Fourth Industrial Revolution) integrates IoT, AI, cloud computing, cyber-physical systems, and real-time data analytics into manufacturing. Enables smart factories with predictive maintenance, mass customization, and autonomous decision-making. India's SAMARTH Udyog initiative promotes Industry 4.0 adoption in MSMEs.
Answer: SQL Injection
SQL Injection occurs when attackers insert malicious SQL statements into input fields to manipulate database queries. Can lead to data theft, deletion, or unauthorized access. Prevention: use parameterized queries, input validation, ORM frameworks, and least-privilege database accounts.
Answer: GSLV Mk III
GSLV Mk III (now called LVM3) is ISRO's heavy-lift launch vehicle capable of placing 4-ton class satellites into GTO. It was used for Chandrayaan-2, Chandrayaan-3, and OneWeb satellite launches. PSLV handles lighter polar orbits; SSLV is for small satellites; ASLV was retired.
Answer: True
Edge computing brings computation and data storage closer to IoT devices and data sources, reducing latency, bandwidth usage, and improving real-time processing. Critical for autonomous vehicles, industrial IoT, and smart cities where milliseconds matter. Complements, not replaces, cloud computing.
Answer: Generative Adversarial Networks
GANs (Generative Adversarial Networks) consist of two neural networks - a generator that creates fake data and a discriminator that evaluates authenticity. They compete to improve output quality. Used in deepfakes, art generation, drug discovery, and data augmentation. Ethical concerns include misinformation.
Answer: Zero
Zero Trust is a cybersecurity framework that requires strict identity verification for every person and device accessing resources on a private network, regardless of location. It follows 'never trust, always verify' principle, using micro-segmentation, least-privilege access, and continuous monitoring.
Answer: Asymmetric Encryption
Asymmetric Encryption (Public-Key Cryptography) uses two mathematically related keys: public key for encryption and private key for decryption. Examples include RSA, ECC, and Diffie-Hellman. It enables secure key exchange and digital signatures, unlike symmetric encryption which uses a single shared key.
Answer: All of these
Modern crypto regulation focuses on economic substance: payment tokens, security tokens, utility tokens regulated by function. Avoids technology lock-in and adapts to innovation. Critical for policy design.
Answer: All of these
Effective crypto regulation: proportionate to actual risks (not one-size-fits-all), technology-neutral (focus on function), risk-based (higher scrutiny for higher-risk activities). Critical for balanced policy design.
Answer: All of these
Effective crypto regulation: technology-neutral (focus on function), proportionate to risks, adaptable to innovation. Avoids stifling development while ensuring consumer protection and financial stability.
Answer: All of these
Modern crypto regulation focuses on economic substance: payment tokens, security tokens, utility tokens regulated by function. Avoids technology lock-in and adapts to innovation. Critical for policy design.
Answer: All of these
Modern crypto regulation focuses on economic substance: payment tokens, security tokens, utility tokens regulated by function. Avoids technology lock-in and adapts to innovation. Critical for policy design questions.
Answer: Corresponding Adjustments
Corresponding adjustments under Article 6 ensure emission reductions transferred internationally are subtracted from seller's inventory and added to buyer's. Prevents double counting, maintains environmental integrity.