Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: All of these
Safe deployment patterns enable zero-downtime, low-risk releases.
Answer: Smart Contracts
Smart contracts are self-executing programs stored on blockchain that automatically enforce terms.
Answer: Renewable
Green hydrogen uses renewable-powered electrolysis, producing only water as byproduct.
Answer: Both A and B
Time series visualization: line charts show trends clearly, area charts emphasize volume. Both effective for temporal data analysis.
Answer: Data Minimization
Data minimization limits collection to what's necessary for specified purpose. Reduces privacy risks, storage costs, breach impact.
Answer: Event-Driven Architecture
Event-driven architecture uses message brokers for asynchronous, decoupled service communication. Enables scalability, resilience, real-time processing.
Answer: Smart Contracts
Smart contracts are self-executing programs stored on blockchain that automatically enforce terms when conditions are satisfied. Used in DeFi, supply chain, insurance.
Answer: Supply Chain Traceability
Blockchain records each transaction/transfer in immutable ledger, enabling end-to-end visibility of product journey. Used for food safety, luxury goods authentication.
Answer: Chaos Engineering
Chaos Engineering (Netflix Chaos Monkey) proactively tests system resilience by injecting failures in controlled experiments. Builds confidence in fault tolerance.
Answer: Both A and B
Adapter/ACL patterns wrap external APIs, translating between internal models and external interfaces. Critical for maintainable integrations and testing.
Answer: Sharding
Sharding partitions data horizontally across nodes based on key ranges or hashes, enabling horizontal scaling. Critical for handling large datasets in distributed databases.
Answer: All of these
NIDHI-PRAYAS (DST) funds prototyping; Startup India offers tax benefits; AIM establishes incubators. Together support innovation from ideation to scale.
Answer: All of these
Immersive tech: VR (fully virtual), AR (overlay on real world), MR (blend virtual/real). Applications: training, education, entertainment, remote collaboration.
Answer: Both A and B
CIS Benchmarks provide hardening guidelines; NIST SP 800-190 covers container security lifecycle. Critical for cloud-native security.
Answer: Both A and B
OWASP API Top 10 lists common API vulnerabilities; NIST SP 800-204 provides security guidelines for microservices APIs. Critical for API security design.
Answer: DigiLocker
DigiLocker enables citizens to store/share government-issued documents digitally. Documents have legal validity under IT Act. Integrates with Aadhaar for authentication.
Answer: Both A and B
OWASP Application Security Verification Standard (ASVS) and ISO 27034 provide frameworks for secure software development, testing, and vulnerability management.
Answer: CPGRAMS
CPGRAMS (Centralized Public Grievance Redress and Monitoring System) enables online lodging and tracking of grievances against central government ministries/departments.
Answer: W3C
World Wide Web Consortium (W3C) develops web standards ensuring interoperability, accessibility, innovation. India participates through W3C India office.
Answer: UMANG
UMANG (Unified Mobile Application for New-age Governance) offers 1,200+ services: Aadhaar, PAN, EPFO, utilities, health. Multilingual, voice search, offline access.