Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: SPADEX
SPADEX (Space Docking Experiment) successfully demonstrated autonomous rendezvous and docking of two spacecraft in Earth orbit in 2024. Critical technology for future space station modules, satellite servicing, and human spaceflight. Represents India's advancement in complex space operations. Important for ISRO current affairs questions.
Answer: bit
Bit (binary digit) is the smallest unit of data in computing, representing either 0 or 1. Eight bits make one byte. All digital information - text, images, audio, video - is ultimately stored and processed as sequences of bits.
Answer: False
HTTP (HyperText Transfer Protocol) transmits data in plaintext, making it insecure for sensitive information. HTTPS (HTTP Secure) uses SSL/TLS encryption to protect data in transit. Always use HTTPS for login pages, payments, and personal data.
Answer: Authentication
Authentication is the process of verifying who a user claims to be, typically using passwords, biometrics, or tokens. It is distinct from authorization (what an authenticated user is allowed to do) and accounting (tracking user activities).
Answer: Aditya-L1
Aditya-L1 is India's first dedicated solar mission, positioned at Lagrange Point 1 (L1) to study the Sun's corona, solar emissions, and space weather. Launched in 2023, it carries seven indigenous payloads for comprehensive solar observations.
Answer: Primary Key
Primary Key is a column or set of columns that uniquely identifies each row in a table. It cannot contain NULL values and must be unique. Foreign keys establish relationships between tables, while candidate keys are potential primary keys.
Answer: Augmented
Augmented Reality (AR) superimposes computer-generated images, sounds, or data onto the real-world environment. Unlike VR which creates fully immersive digital environments, AR enhances reality. Applications include gaming, education, retail, and navigation.
Answer: False
SSDs use flash memory chips with no moving parts, making them faster, more durable, and quieter than HDDs (Hard Disk Drives) which use spinning platters and mechanical read/write heads. SSDs are now standard in most modern computers.
Answer: UPI
UPI (Unified Payments Interface) enables instant bank-to-bank transactions using virtual payment addresses (e.g., name@bank). Developed by NPCI, it supports peer-to-peer and merchant payments, bill payments, and integrates with multiple banking apps.
Answer: False
Chandrayaan-2's lander Vikram lost communication during final descent and crash-landed on the Moon in September 2019. However, the orbiter component was successfully placed in lunar orbit and continues to provide valuable scientific data.
Answer: Firewall
Firewall is a network security device/software that monitors and filters traffic between trusted internal networks and untrusted external networks based on security rules. It can be hardware-based, software-based, or cloud-based.
Answer: Register
Registers are the fastest memory type, located inside the CPU, used for immediate data processing. Cache is next fastest (L1/L2/L3), followed by RAM, then storage devices (SSD/HDD). Speed hierarchy: Registers > Cache > RAM > SSD > HDD.
Answer: IoT
IoT (Internet of Things) refers to network of physical devices embedded with sensors, software, and connectivity to collect and exchange data. Applications include smart homes, industrial automation, healthcare monitoring, and smart cities.
Answer: IP
IP (Internet Protocol) Address is a numerical label assigned to each device connected to a network. IPv4 uses 32-bit addresses (e.g., 192.168.1.1), while IPv6 uses 128-bit addresses to accommodate the growing number of internet-connected devices.
Answer: Stack
Stack is a linear data structure that follows LIFO principle - the last element added is the first to be removed. Operations include push (add) and pop (remove). Used in function call management, expression evaluation, and undo mechanisms.
Answer: False
Using the same password across multiple accounts is highly risky. If one account is breached, attackers can access all accounts with the same credentials. Best practice: use unique, strong passwords for each account and enable two-factor authentication.
Answer: NavIC
NavIC (Navigation with Indian Constellation), formerly IRNSS, is India's independent regional satellite navigation system providing accurate position information over India and 1500 km around. It consists of 7 satellites and is an alternative to GPS.
Answer: 2G
2G (specifically GPRS/EDGE enhancements) introduced packet-switched data transmission, enabling always-on internet access and efficient data usage. 1G was analog voice only; 3G improved data speeds; 4G introduced all-IP architecture with higher bandwidth.
Answer: Hyper Text Transfer Protocol Secure
HTTPS indicates that communication between browser and website is encrypted using SSL/TLS protocols. This protects data from eavesdropping and tampering. Users should look for the padlock icon and 'https://' when entering sensitive information online.
Answer: DigiLocker
DigiLocker is a cloud-based platform under Digital India that enables citizens to store, share, and verify important documents digitally. Documents issued by registered authorities through DigiLocker have legal validity under the Information Technology Act, 2000.