Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Encryption
Encryption transforms plaintext into ciphertext using algorithms and keys, ensuring only authorized parties with decryption key can read the data. Protects data at rest (stored) and in transit (transmitted). Hashing is one-way for integrity; encoding (Base64) is not security; compression reduces size.
Answer: NFS
NFS (National Financial Switch) is NPCI's largest ATM network in India, enabling interoperability so customers can withdraw cash from any bank's ATM using their debit card. Connects over 2.5 lakh ATMs. RuPay is card network, UPI/IMPS are fund transfer systems. NFS handles ATM transaction routing and settlement.
Answer: Network
Network Layer (Layer 3) handles logical addressing (IP addresses), routing packets between networks, and path determination. Routers operate at this layer. Data Link (Layer 2) handles MAC addresses and local delivery; Transport (Layer 4) manages end-to-end connections and reliability.
Answer: Patch
Patch Management is the process of acquiring, testing, and installing code changes (patches) to fix security vulnerabilities, bugs, or improve functionality. Critical for protecting systems from exploits targeting known flaws. Automated tools and scheduled maintenance windows help streamline patch deployment.
Answer: True
BharatNet (formerly NOFN) is one of the world's largest rural connectivity projects, aiming to provide minimum 100 Mbps bandwidth to all 2.5 lakh gram panchayats via optical fiber. Enables delivery of e-governance, tele-education, telemedicine, and digital services to rural India.
Answer: 2G
2G (specifically GPRS/EDGE enhancements) introduced packet-switched data enabling basic mobile internet, email, and MMS. 1G was analog voice only. 3G brought faster data for video calls and web browsing. 4G enabled HD video streaming and app ecosystems. Each generation built upon previous capabilities.
Answer: Fourth
The Fourth Industrial Revolution (Industry 4.0) blends technologies like AI, IoT, robotics, 3D printing, and biotechnology, blurring lines between physical, digital, and biological domains. India's initiatives like SAMARTH Udyog and National Strategy on AI aim to harness this transformation for inclusive growth.
Answer: SSD
SSD (Solid State Drive) uses flash memory chips with no moving parts, offering faster boot times, file access, and durability compared to HDDs with spinning platters. SSDs are silent, consume less power, and are resistant to physical shock. Prices have decreased, making SSDs standard in modern devices.
Answer: NAT
NAT (Network Address Translation) allows multiple devices on a private network to share a single public IP address when accessing the internet. Conserves IPv4 addresses and adds a layer of security by hiding internal network structure. Implemented in routers and firewalls.
Answer: True
Smart contracts are self-executing programs stored on blockchain that automatically enforce agreements when coded conditions are satisfied. Eliminate intermediaries, reduce fraud, and increase transparency. Used in DeFi, supply chain, insurance, and voting. Code vulnerabilities require careful auditing.
Answer: NISAR
NISAR (NASA-ISRO Synthetic Aperture Radar) is a joint Earth-observation satellite using dual-frequency radar to monitor ecosystems, ice masses, vegetation, and natural hazards. Scheduled for launch in 2024, it will provide unprecedented data for climate science and disaster management globally.
Answer: SWAYAM
SWAYAM (Study Webs of Active-Learning for Young Aspiring Minds) is a MOOC platform offering free online courses from 9th grade to post-graduation by reputed Indian institutions. Credits earned can be transferred to academic records. Part of Digital India's education transformation initiatives.
Answer: VoLTE
VoLTE (Voice over LTE) transmits voice as IP packets over 4G data network, enabling simultaneous voice calls and high-speed internet without dropping to 3G/2G. Provides HD voice quality, faster call setup, and improved battery life. Requires compatible device, SIM, and network support.
Answer: True
Unicode is a universal character encoding standard supporting over 149,000 characters from 161 scripts, plus symbols, emojis, and historical scripts. Replaces legacy encodings (ASCII, ISO-8859) that supported limited languages. UTF-8 is the dominant Unicode encoding on the web and modern systems.
Answer: Digital Signature
Digital Signatures use public-key cryptography to verify message integrity (not altered) and authenticity (sender identity). Based on hashing and asymmetric encryption. Used in software distribution, financial transactions, legal documents. Distinct from digital certificates which bind public keys to identities.
Answer: AePS
AePS (Aadhaar Enabled Payment System) uses Aadhaar number and biometric authentication (fingerprint/iris) for cash withdrawal, deposit, balance inquiry, and fund transfer at Micro-ATMs. Operated by NPCI, it enables banking services for citizens without cards, phones, or internet connectivity.
Answer: True
Proxy servers act as intermediaries between client and internet, masking the user's real IP address. By connecting through a proxy in another country, users can access geo-restricted content. However, many services now detect and block proxy/VPN traffic. Legal and policy considerations apply.
Answer: Worm
Computer Worm is standalone malware that self-replicates to spread across networks, exploiting vulnerabilities without requiring user action (unlike viruses that need host files). Worms can consume bandwidth, install backdoors, or deliver payloads. Prevention: network segmentation, patching, firewall rules.
Answer: COMMIT
COMMIT permanently saves all changes made during a transaction to the database. ROLLBACK undoes uncommitted changes. Transactions follow ACID properties (Atomicity, Consistency, Isolation, Durability). Proper use of COMMIT/ROLLBACK ensures data integrity in multi-user database environments.
Answer: Machine
Machine Learning enables systems to learn patterns from data and improve performance on tasks without explicit programming. Types: Supervised (labeled data), Unsupervised (pattern discovery), Reinforcement (reward-based learning). Applications: recommendation engines, fraud detection, predictive maintenance.