Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: All of these
Semiconductor diversification driven by: geopolitical tensions (US-China), demand surge (AI, EVs), and tech advancement (smaller nodes). India's semiconductor mission aligns with global reshoring trends. Critical for tech geopolitics questions.
Answer: Event-Driven Architecture
Event-Driven Architecture uses events/messages for service communication via brokers (Kafka, RabbitMQ). Enables scalability, resilience, and real-time processing. Complements microservices. Critical for distributed systems design questions.
Answer: SDN
SDN (Software-Defined Networking) centralizes control in software controllers, enabling dynamic traffic management, automation, and innovation. NFV virtualizes network functions. Critical for modern network architecture questions.
Answer: UMANG
UMANG (Unified Mobile Application for New-age Governance) offers 1,200+ services: Aadhaar, PAN, EPFO, utilities, health. Multilingual, voice search, offline access. Critical for digital service delivery questions.
Answer: Shared Responsibility Model
Cloud providers secure infrastructure ('security OF cloud'); customers secure data/apps ('security IN cloud'). Responsibilities vary by service model (IaaS/PaaS/SaaS). Critical for cloud governance and compliance questions.
Answer: T-Hub
T-Hub (Telangana) is India's largest innovation campus, connecting startups with corporates, investors, and mentors. Supports deep tech, healthtech, and enterprise solutions. Critical for understanding India's startup infrastructure questions.
Answer: Federated Learning
Federated Learning trains models across devices/servers holding local data, sharing only model updates. Preserves privacy while enabling collaborative AI. Used in healthcare, finance, and mobile keyboards. Critical for privacy-preserving AI questions.
Answer: Direction 20
CERT-In Direction 20 (April 2022) requires service providers to report cyber incidents within 6 hours, maintain logs for 180 days, and synchronize clocks with National Time Server. Critical for incident response compliance questions.
Answer: Both A and B
e-Courts project integrates video conferencing for virtual hearings, e-filing, and case management. Enhanced during pandemic for access to justice. Critical for digital governance and judicial reform questions.
Answer: CSPM
CSPM (Cloud Security Posture Management) automates detection/remediation of misconfigurations (public S3 buckets, open ports). Critical for preventing cloud breaches. CWPP protects workloads; CASB governs SaaS; SIEM aggregates logs. Important for cloud security operations questions.
Answer: NIST Cybersecurity Framework
NIST CSF (Identify, Protect, Detect, Respond, Recover) provides flexible, risk-based approach to cybersecurity management. Widely adopted globally and referenced in Indian policies. Critical for security governance and compliance questions.
Answer: All of these
Smart buildings integrate IoT sensors (occupancy, temperature), BMS for HVAC/lighting control, and AI for predictive optimization. Reduces energy waste by 20-40%. Critical for green building and energy efficiency questions.
Answer: Physical Tampering
IoT devices are often deployed in accessible locations, vulnerable to physical tampering, theft, or environmental attacks. Requires hardware security modules, secure boot, and tamper-evident designs. Critical for IoT security architecture questions.
Answer: Blockchain/NFTs
Blockchain with NFTs (Non-Fungible Tokens) enables verifiable digital ownership, provenance tracking, and peer-to-peer transfers without intermediaries. Applications: art, gaming, identity, supply chain. Critical for understanding Web3 and digital economy questions.
Answer: DigiLocker
DigiLocker enables citizens to store/share government-issued documents (license, certificates) digitally. Documents have legal validity under IT Act. Integrates with Aadhaar for authentication. Critical for paperless governance and digital inclusion questions.
Answer: Object Detection
Object Detection identifies AND locates multiple objects with bounding boxes (YOLO, R-CNN). Image Classification assigns single label; Semantic Segmentation labels each pixel. Critical for autonomous vehicles, surveillance, and medical imaging applications.
Answer: All of these
Carbon tracking combines: IoT sensors (emission data), blockchain (immutable records), and AI (pattern analysis) for end-to-end footprint visibility. Enables carbon accounting, offset verification, and sustainable sourcing. Critical for ESG and climate governance questions.
Answer: Data Processing Near Source
Edge computing processes data close to IoT devices/sensors, reducing round-trip latency to cloud. Critical for autonomous vehicles, industrial automation, and AR/VR. Complements cloud for hierarchical processing. Key for distributed systems architecture questions.
Answer: W3C DID Specification
W3C DID Specification enables users to create/own identifiers without central authorities. DIDs resolve to DID Documents containing public keys and service endpoints. Foundation for portable, privacy-preserving identity in Web3 and metaverse. Critical for digital identity standards questions.
Answer: Account Aggregator
Account Aggregator framework enables consent-based financial data sharing between institutions. Users control data flow via AA apps. Part of India Stack's layered DPI: identity (Aadhaar), payments (UPI), data sharing (AA), documents (DigiLocker). Critical for digital governance questions.