Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Penny Drop
Penny Drop verification sends ₹1 to a bank account using account number and IFSC; successful credit confirms account validity and name match. Used for KYC, onboarding, and fraud prevention in fintech. Automated via NPCI's APIs. Faster and more reliable than manual document verification, enhancing user experience and compliance.
Answer: Capacitor
Capacitor stores energy in electric field between two conductive plates separated by dielectric. Measured in Farads. Applications: filtering, timing circuits, power factor correction, energy storage. Inductor stores energy in magnetic field; resistor dissipates energy as heat; transformer transfers energy between circuits via electromagnetic induction.
Answer: Transparency
Transparency (Explainable AI/XAI) ensures AI decisions are interpretable by humans, enabling trust, debugging, and regulatory compliance. Techniques: LIME, SHAP, attention visualization. Critical in high-stakes domains: healthcare diagnosis, loan approvals, criminal justice. Balances model complexity with interpretability needs.
Answer: All of these
India's first 5G spectrum auction (2022) included low-band (700 MHz for coverage), mid-band (3.3-3.67 GHz for capacity/coverage balance), and high-band/mmWave (24.25-28.5 GHz for ultra-high speeds in dense areas). Operators strategically bid based on use cases: rural coverage vs urban capacity vs industrial applications.
Answer: ==
Double equals (==) checks value equality in C, Java, Python, JavaScript. Single equals (=) is assignment operator. Triple equals (===) in JavaScript checks value AND type equality. := is assignment in Pascal/Go. Understanding operator precedence and type coercion is crucial for writing correct conditional logic in exams and real code.
Answer: Regulatory Sandbox
RBI Regulatory Sandbox enables fintech startups and banks to test new products/services with real customers under relaxed regulations for limited period/time/scale. Reduces time-to-market, fosters innovation while managing risks. Themes include retail payments, KYC, lending, cybersecurity. Successful pilots may lead to regulatory framework updates.
Answer: Heap
Heap (specifically binary heap) efficiently implements priority queue with O(log n) insertion and extraction of highest/lowest priority element. Arrays/lists require O(n) search for priority element. Heaps maintain partial order: parent node has higher/lower priority than children. Used in scheduling, Dijkstra's algorithm, and event simulation.
Answer: Response
Instruction tuning fine-tunes LLMs on instruction datasets, improving task completion and helpfulness.
Answer: True
Post-incident review captures lessons learned: what happened, response effectiveness, root causes, improvements. Critical for continuous security program maturity.
Answer: SDSC-SHAR
Satish Dhawan Space Centre (SDSC-SHAR) in Andhra Pradesh is ISRO's primary launch port. Handles PSLV, GSLV, SSLV, and future human spaceflight launches.
Answer: Both A and B
Spiking neurons fire only when needed; event-driven processing handles only changes. Combined enable orders-of-magnitude better energy efficiency than GPUs for edge AI.
Answer: Grover's Algorithm
Grover's Algorithm searches unsorted database of N items in O(√N) queries vs O(N) classically. Applications: optimization, cryptography, machine learning enhancement.
Answer: Both A and B
GDPR Article 35 and DPDP Act Section 10 require DPIAs for processing likely to result in high risk to individuals' rights. Critical for privacy-by-design compliance.
Answer: Backdoor Attack
Backdoor attacks inject malicious patterns during training that cause targeted misclassification when trigger present. Critical threat requiring robust training data validation.
Answer: All of these
Comprehensive cloud security: IaC scanning (Terraform, CloudFormation), container image scanning, runtime protection (Falco, Tetragon). Combined for defense-in-depth.
Answer: Both A and B
Software-Defined Perimeter (SDP) creates identity-based perimeters; micro-segmentation isolates workloads. Both implement Zero Trust by limiting access to authenticated, authorized entities only.
Answer: Business
A/B testing randomly assigns users to model variants, measuring metrics like conversion, engagement.
Answer: PM-WANI
PM-WANI enables public Wi-Fi hotspots via Public Data Offices using satellite/fiber backhaul. Aims to provide affordable internet in rural/remote areas.
Answer: All of these
Leading qubit implementations: superconducting (IBM, Google), trapped ions (IonQ), photonic (Xanadu). Each has trade-offs in coherence, scalability, error rates.
Answer: GDPR
GDPR Article 33 requires breach notification to supervisory authority within 72 hours of awareness. Critical for incident response compliance.