Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: ₹8000 crore
NM-QTA (2020) allocates ₹8000 crore for quantum computing, communication, sensing, and materials research. Implemented by DST with IITs, IISc participation. Critical for science policy questions.
Answer: Classical transistors
Leading qubit implementations: superconducting (IBM, Google), trapped ions (IonQ), photonic (Xanadu). Classical transistors cannot maintain quantum coherence. Critical for understanding quantum hardware landscape.
Answer: True
QKD uses no-cloning theorem and measurement disturbance to detect eavesdropping during key exchange. Provides provable security unlike computational security of RSA/ECC. Deployed in limited networks globally.
Answer: True
#AIforAll (NITI Aayog) focuses on leveraging AI for social empowerment: AI for farmers, teachers, doctors. Balances innovation with ethics, inclusion, and national interest. Critical for AI policy questions.
Answer: All of these
Privacy-preserving AI: Differential Privacy adds noise to aggregates; Federated Learning trains on-device; Synthetic Data generates artificial datasets. All enable AI while protecting individual privacy.
Answer: Auditing / Assessment
AI Auditing involves systematic evaluation of models for fairness, accuracy, robustness, and compliance. Tools include bias detection frameworks, performance metrics, and third-party assessments. Critical for responsible AI deployment.
Answer: Both A and B
India endorses OECD AI Principles (2019) and UNESCO Recommendation on AI Ethics (2021). Both emphasize human rights, transparency, accountability, and sustainability. Critical for AI governance questions.
Answer: True
DPDP Act mandates transparency in automated decisions: individuals have right to explanation for decisions affecting rights, benefits, or obligations. Aligns with global standards like GDPR Article 22.
Answer: in-the-loop
Human-in-the-loop (HITL) ensures human oversight of AI decisions, especially in high-stakes domains. Critical for accountability, error correction, and ethical compliance. Complements human-on-the-loop supervision.
Answer: True
Algorithmic accountability mandates transparency in AI: documenting data sources, model design, testing, and decision logic. Enables auditing, bias detection, and redressal. Supported by DPDP Act and sectoral guidelines.
Answer: Fairness
Fairness in AI requires systems to avoid bias based on race, gender, caste, religion, etc. Techniques include bias detection metrics, diverse training data, and fairness-aware algorithms. Critical for ethical AI deployment in hiring, lending, and public services.
Answer: Right to Erasure
Right to Erasure (Right to be Forgotten) allows individuals to request deletion of personal data when no longer necessary or consent withdrawn. Critical for DPDP/GDPR compliance questions.
Answer: True
CSPM automates detection/remediation of cloud misconfigurations: public storage, weak IAM, unencrypted data. Critical for preventing cloud breaches.
Answer: Both A and B
NIST IR 8259 and ETSI EN 303 645 provide IoT security baselines: secure boot, updates, data protection. Critical for IoT security architecture questions.
Answer: Forum / Index
ITU Global Cybersecurity Index assesses national cybersecurity commitment; forums facilitate knowledge sharing. India ranks high in GCI. Critical for international cybersecurity questions.
Answer: All of these
Cloud AI certifications validate skills in model development, deployment, MLOps. Critical for AI/ML roles in growing Indian tech sector.
Answer: True
Strangler Fig incrementally replaces monolith features with microservices behind API gateway. Reduces risk vs big-bang rewrite. Critical for legacy modernization questions.
Answer: All of these
Constraints enforce rules; triggers automate actions; DQ rules validate/clean data. Combined for data integrity. Critical for reliable analytics and compliance.
Answer: SSH
SSH (Secure Shell) encrypts remote command execution and file transfer, replacing insecure Telnet. Critical for secure network administration.
Answer: Both A and B
iDEX (Defence) and IN-SPACe (Space) provide funding, mentorship, and market access for startups in strategic domains. Critical for defense/space innovation questions.