Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Quantum
Post-Quantum Cryptography (PQC) develops algorithms secure against quantum attacks (Shor's algorithm). NIST is standardizing PQC algorithms (CRYSTALS-Kyber, Dilithium). Critical for future-proofing sensitive systems. India's CERT-In and DRDO actively research PQC. Important for strategic cybersecurity questions.
Answer: Digital India Act
Digital India Act (proposed) aims to replace IT Act 2000 with updated framework addressing: platform accountability, emerging tech governance, user rights, and cybercrime. Complements DPDP Act 2023. Critical for understanding India's evolving digital regulatory landscape in policy-focused exams.
Answer: Zero Trust Architecture
Zero Trust Architecture assumes no implicit trust based on network location. Every access request is authenticated, authorized, and encrypted regardless of origin. Implements micro-segmentation, least-privilege access, and continuous monitoring. Critical for modern enterprise security and frequently tested in banking/UPSC exams.
Answer: Quantum Inertial Navigation
Quantum accelerometers and gyroscopes use atom interferometry for drift-free navigation, critical for submarines, aircraft, and autonomous vehicles in GPS-denied environments. AI enhances sensor fusion and error correction. Research by DRDO, ISRO, and global labs. Critical for strategic technology questions.
Answer: True
Neuromorphic chips (Intel Loihi, IBM TrueNorth) use spiking neural networks and event-driven processing to achieve orders-of-magnitude better energy efficiency than conventional GPUs for AI tasks. Promising for edge AI, robotics, and sustainable computing. Research ongoing at IITs and global labs.
Answer: All of these
Privacy-enhancing technologies: SMPC enables collaborative computation on encrypted data, homomorphic encryption allows processing ciphertext, and ZK-proofs verify statements without revealing data. Critical for confidential AI, federated learning, and privacy-preserving analytics in finance and healthcare.
Answer: Quantum Annealing
Quantum annealing (D-Wave) uses quantum tunneling to find global minima in optimization landscapes, suited for logistics, finance, and machine learning. Differs from gate-based quantum computing. Hybrid quantum-classical approaches show near-term promise. Critical for understanding quantum applications beyond cryptography.
Answer: All of these
Convergence of AI, bioinformatics, and synthetic biology accelerates drug discovery: AI predicts protein structures (AlphaFold), bioinformatics analyzes genomic data, synthetic biology designs novel biological systems. Indian startups and research institutes actively contribute. Critical for biotech innovation and healthcare questions.
Answer: True
6G (expected ~2030) targets: terahertz spectrum (0.1-10 THz) for ultra-high bandwidth, AI-native networks, integrated sensing-communication, and holographic/immersive experiences. India's 6G vision document (2023) outlines research priorities. Critical for understanding next-generation telecom evolution questions.
Answer: QKD
QKD (Quantum Key Distribution) uses quantum physics principles to generate and share encryption keys with provable security. Deployed in limited metro networks (e.g., DRDO's QKD link). Challenges: distance limits, cost, and integration with existing infrastructure. Critical for future-proof cybersecurity questions.
Answer: Bio-molecular / DNA
DNA data storage encodes digital information into synthetic DNA strands, offering extreme density (exabytes/gram) and longevity (thousands of years). Challenges: slow read/write speeds and high costs. Research by Microsoft, IITs, and startups. Represents convergence of biology and information technology for archival storage.
Answer: Fog Computing
Fog Computing extends cloud capabilities to network edge (routers, gateways), enabling real-time processing for IoT, autonomous vehicles, and industrial automation. Reduces latency, bandwidth usage, and enhances privacy. Complements cloud (centralized) and edge (device-level) computing. Critical for distributed systems questions.
Answer: True
Invasive BCIs (like Neuralink, Synchron) have enabled paralyzed individuals to control cursors, robotic arms, and communicate via thought in clinical trials. Non-invasive BCIs (EEG) offer limited control. Challenges: signal resolution, surgical risks, and long-term stability. Represents frontier of neurotechnology and assistive devices.
Answer: False
AGI (human-level AI that can learn and perform any intellectual task) does not yet exist. Current AI systems are Narrow AI, designed for specific tasks. AGI remains a research goal with significant technical and ethical challenges to overcome.
Answer: DDoS
DDoS (Distributed Denial of Service) attack uses multiple compromised systems to flood a target server with traffic, exhausting resources and making services unavailable. Mitigation includes traffic filtering, rate limiting, and using DDoS protection services.
Answer: False
Blockchain has diverse applications beyond cryptocurrency: supply chain tracking, digital identity, voting systems, healthcare records, land registries, and smart contracts. Its core value is providing decentralized, tamper-proof, transparent record-keeping.
Answer: Quantum Computing
Quantum Computing uses qubits that can exist in superposition (0 and 1 simultaneously) and entanglement (correlated states) to solve certain problems exponentially faster than classical computers, with applications in cryptography, drug discovery, and optimization.
Answer: Machine
Machine Learning is a subset of Artificial Intelligence where algorithms improve automatically through experience and data. It includes supervised, unsupervised, and reinforcement learning approaches used in recommendation systems, fraud detection, and more.
Answer: universal
Article 51 global constitutionalism and human rights: (a) Article 51 text: State shall endeavor to: (i) Promote international peace and security, (ii) Maintain just and honorable relations between nations, (iii) Foster respect for international law and treaty obligations, (iv) Encourage settlement of international disputes by arbitration, (b) Universal values rationale: (i) Human dignity: Core constitutional values (dignity, equality, liberty) recognized across legal traditions; not culture-specific but universal human aspirations, (ii) Shared challenges: Global issues (climate change, pandemics, migration) require collective action based on shared values, not narrow nationalism, (iii) Normative influence: International human rights norms enrich domestic constitutional interpretation; foster convergence on rights protection, (c) Judicial integration of international law: (i) Human rights treaties: Courts refer to ICCPR, CEDAW, CRC to interpret Fundamental Rights (e.g., privacy, gender equality, child rights), (ii) Environmental agreements: Paris Agreement, biodiversity conventions inform Indian environmental jurisprudence, sustainable development principles, (iii) Comparative jurisprudence: Courts cite foreign judgments (US, EU, South Africa) to enrich constitutional interpretation, while respecting Indian context, (d) Applications: (i) Puttaswamy (2017): Cited international privacy jurisprudence to recognize privacy as Fundamental Right under Article 21, (ii) Navtej Singh Johar (2018): Referenced international LGBTQ+ rights jurisprudence to decriminalize homosexuality, advance dignity, equality, (iii) Climate litigation: Emerging cases reference international climate agreements, intergenerational equity principles to challenge inadequate climate action, (e) Challenges: (i) Sovereignty concerns: Balancing international commitments with national autonomy requires careful negotiation, constitutional compliance, (ii) Contextual adaptation: International norms require adaptation to Indian social, cultural, legal context; not mechanical transplantation, (iii) Implementation gaps: Domestic capacity, political will affect treaty implementation; require institutional strengthening, public awareness, (f) Illustrates global constitutionalism: Article 51 operationalized through judicial interpretation, legislative implementation; balance between universal values, national context, constitutional identity essential for realizing constitutional vision of just, humane society in interconnected world.
Answer: equitable
Article 47 nutrition and public health systems: (a) Article 47 text: State shall regard raising level of nutrition, standard of living of people, improvement of public health as among its primary duties; endeavor to bring about prohibition of intoxicating drinks, drugs injurious to health, (b) Equitable access rationale: (i) Health as right: Access to quality healthcare essential for human dignity, capability development; not privilege of affluent, (ii) Social determinants: Health outcomes shaped by social, economic factors; equitable access requires addressing poverty, discrimination, exclusion, (iii) Systemic approach: Equitable access requires not just facilities but affordable, acceptable, accessible services; addresses financial, geographic, cultural barriers, (c) Health system operationalization: (i) Ayushman Bharat - PM-JAY: Provides health insurance coverage up to ₹5 lakh per family per year for economically vulnerable families; reduces catastrophic health expenditure, (ii) Health and Wellness Centres: Transforming sub-centers, primary health centers into comprehensive primary care facilities; enhances access, quality at grassroots, (iii) Public health programs: Immunization, maternal health, disease control programs address population-level health needs, prevent inequities, (d) Applications: (i) Financial protection: PM-JAY reduces out-of-pocket expenditure, enables access to secondary, tertiary care for poor families, (ii) Primary care strengthening: HWCs provide preventive, promotive, curative services; reduce burden on hospitals, improve health outcomes, (iii) Digital health: Ayushman Bharat Digital Mission enables portability, continuity of care through digital health records, telemedicine, (e) Challenges: (i) Quality assurance: Ensuring quality of care in public, private sectors requires standards, accreditation, monitoring, (ii) Human resources: Shortage of doctors, nurses, especially in rural areas; require training, incentives, task-shifting, (iii) Convergence: Coordination among health, nutrition, sanitation, education departments essential for holistic health outcomes, (f) Illustrates transformative health policy: Article 47 operationalized through health system reforms; balance between infrastructure, human resources, financial protection essential for realizing constitutional vision of equitable, quality healthcare for all.