Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Using 12+ characters with mix of types
Strong passwords should be at least 12 characters long with uppercase, lowercase, numbers, and special symbols. Avoid personal info, dictionary words, or patterns. Use unique passwords per account and store them in a password manager. Enable two-factor authentication for critical accounts.
Answer: Natural Language
Natural Language Processing (NLP) combines linguistics, computer science, and AI to enable machines to understand, interpret, and generate human language. Applications include chatbots, translation services, sentiment analysis, voice assistants, and automated content summarization.
Answer: IMPS
IMPS (Immediate Payment Service) enables instant interbank electronic fund transfer 24x7 using mobile number + MMID (Mobile Money Identifier) or account number + IFSC. Developed by NPCI, it supports transfers up to ₹5 lakh. NEFT/RTGS have timing restrictions; ECS is for bulk/recurring payments.
Answer: do-while
do-while loop checks the condition AFTER executing the loop body, guaranteeing at least one execution. In contrast, while and for loops check condition BEFORE execution, potentially skipping the body entirely if condition is initially false. Syntax varies by language but logic remains consistent.
Answer: Fingerprint
Authentication factors: 1) Something you know (password/PIN), 2) Something you have (smart card/token), 3) Something you are (biometrics like fingerprint, iris, face). Multi-factor authentication combines two or more factors for enhanced security. Fingerprint is a biometric ('something you are') factor.
Answer: SMTP
SMTP (Simple Mail Transfer Protocol) is used for sending emails from client to server or between mail servers. POP3 and IMAP are used for retrieving emails from server to client. SMTP typically uses port 25 (or 587 for secure submission).
Answer: .exe
.exe (executable) files contain programs that can be run directly by the Windows operating system. Users should be cautious opening .exe files from untrusted sources as they can contain malware. Other extensions: .txt (text), .pdf (document), .jpg (image) are data files, not executables.
Answer: True
VoLTE (Voice over LTE) allows voice calls to be transmitted as data packets over 4G networks, enabling faster call setup, HD voice quality, and simultaneous voice+data usage. Unlike traditional calls that drop to 2G/3G, VoLTE maintains 4G connectivity throughout the call.
Answer: Man
Man-in-the-Middle (MitM) attack occurs when attackers secretly relay and possibly alter communication between two parties who believe they are directly communicating. Prevention includes using HTTPS, VPNs, certificate pinning, and avoiding public Wi-Fi for sensitive transactions.
Answer: CARTOSAT
CARTOSAT series satellites are dedicated to Earth observation and remote sensing with high-resolution cameras for cartography, urban planning, and resource monitoring. INSAT is for communication/weather, GSAT for communication, and IRNSS/NavIC for navigation.
Answer: False
Cache memory is FASTER than main RAM but SLOWER than CPU registers. Speed hierarchy: CPU Registers (fastest) > L1 Cache > L2 Cache > L3 Cache > RAM > SSD > HDD (slowest). Cache stores frequently accessed data to reduce CPU wait time and improve system performance.
Answer: True
IPv6 uses 128-bit addresses (e.g., 2001:0db8:85a3::8a2e:0370:7334) providing approximately 3.4×10^38 unique addresses, solving IPv4 exhaustion. IPv4 uses 32-bit addresses (e.g., 192.168.1.1) allowing ~4.3 billion addresses. IPv6 also offers improved security and auto-configuration.
Answer: HAVING
HAVING clause filters results after GROUP BY aggregation, while WHERE filters rows before grouping. Example: SELECT dept, AVG(salary) FROM emp GROUP BY dept HAVING AVG(salary) > 50000. WHERE cannot be used with aggregate functions directly.
Answer: NFC
NFC (Near Field Communication) enables contactless payments by allowing two devices to communicate when placed within 4 cm. Used in Google Pay, Apple Pay, and RuPay Contactless. It operates at 13.56 MHz and supports secure element storage for payment credentials.
Answer: e-Kranti
e-Kranti (National e-Governance Plan 2.0) is a pillar of Digital India focusing on electronic delivery of government services across sectors like education, health, agriculture, and justice. It emphasizes integrated services, cloud adoption, and mobile-first approach for citizen convenience.
Answer: Virtual
Virtual Reality (VR) creates simulated 3D environments that users can interact with using headsets and controllers. Unlike AR which augments reality, VR completely replaces the physical world. Applications include gaming, training simulations, virtual tours, and therapeutic uses.
Answer: True
Gaganyaan is ISRO's ambitious human spaceflight program aiming to send Indian astronauts (Gagannauts) to low Earth orbit (~400 km) for 3-7 days. The mission uses GSLV Mk III rocket and includes multiple uncrewed test flights before the crewed mission, targeted for 2025-26.
Answer: True
CBDC design can include holding limits, tiered remuneration, and intermediation models to preserve bank deposit role. Critical for financial stability while enabling digital payment innovation.
Answer: FIU-IND
Financial Intelligence Unit-India (FIU-IND) receives, analyzes, and disseminates financial intelligence including crypto transactions. VASPs must register and report suspicious activities under PMLA.
Answer: mBridge / Multi-CBDC
Multi-CBDC platforms (mBridge, Project Dunbar) test cross-border settlements using interoperable digital currencies. Aims to reduce cost, time, and intermediaries in international payments.