Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: OneWeb
OneWeb (Bharti Group partnership) operates LEO constellation for global broadband, especially rural/remote areas. Competes with Starlink. Critical for digital connectivity and space commerce questions.
Answer: NavIC
NavIC (Navigation with Indian Constellation) has 7 satellites providing positioning accuracy better than 20m over India and 1500 km surrounding area. Alternative to GPS for strategic autonomy.
Answer: True
LEO satellites (~500-2000 km altitude) have lower propagation delay (~20-50ms) vs GEO (~35,786 km, ~250ms latency). Critical for real-time applications: video calls, gaming, financial trading.
Answer: Entanglement
Quantum entanglement enables correlated states between particles, foundational for quantum teleportation, superdense coding, and quantum computing. Critical for understanding quantum information science.
Answer: AES-256
AES-256 with 256-bit keys is considered quantum-resistant because Grover's algorithm only provides quadratic speedup, requiring doubling key size for equivalent security. DES/3DES/RC4 are broken or weak.
Answer: ₹8000 crore
NM-QTA (2020) allocates ₹8000 crore for quantum computing, communication, sensing, and materials research. Implemented by DST with IITs, IISc participation. Critical for science policy questions.
Answer: Classical transistors
Leading qubit implementations: superconducting (IBM, Google), trapped ions (IonQ), photonic (Xanadu). Classical transistors cannot maintain quantum coherence. Critical for understanding quantum hardware landscape.
Answer: True
QKD uses no-cloning theorem and measurement disturbance to detect eavesdropping during key exchange. Provides provable security unlike computational security of RSA/ECC. Deployed in limited networks globally.
Answer: True
#AIforAll (NITI Aayog) focuses on leveraging AI for social empowerment: AI for farmers, teachers, doctors. Balances innovation with ethics, inclusion, and national interest. Critical for AI policy questions.
Answer: All of these
Privacy-preserving AI: Differential Privacy adds noise to aggregates; Federated Learning trains on-device; Synthetic Data generates artificial datasets. All enable AI while protecting individual privacy.
Answer: Auditing / Assessment
AI Auditing involves systematic evaluation of models for fairness, accuracy, robustness, and compliance. Tools include bias detection frameworks, performance metrics, and third-party assessments. Critical for responsible AI deployment.
Answer: Both A and B
India endorses OECD AI Principles (2019) and UNESCO Recommendation on AI Ethics (2021). Both emphasize human rights, transparency, accountability, and sustainability. Critical for AI governance questions.
Answer: True
DPDP Act mandates transparency in automated decisions: individuals have right to explanation for decisions affecting rights, benefits, or obligations. Aligns with global standards like GDPR Article 22.
Answer: in-the-loop
Human-in-the-loop (HITL) ensures human oversight of AI decisions, especially in high-stakes domains. Critical for accountability, error correction, and ethical compliance. Complements human-on-the-loop supervision.
Answer: True
Algorithmic accountability mandates transparency in AI: documenting data sources, model design, testing, and decision logic. Enables auditing, bias detection, and redressal. Supported by DPDP Act and sectoral guidelines.
Answer: Fairness
Fairness in AI requires systems to avoid bias based on race, gender, caste, religion, etc. Techniques include bias detection metrics, diverse training data, and fairness-aware algorithms. Critical for ethical AI deployment in hiring, lending, and public services.
Answer: Right to Erasure
Right to Erasure (Right to be Forgotten) allows individuals to request deletion of personal data when no longer necessary or consent withdrawn. Critical for DPDP/GDPR compliance questions.
Answer: True
CSPM automates detection/remediation of cloud misconfigurations: public storage, weak IAM, unencrypted data. Critical for preventing cloud breaches.
Answer: Both A and B
NIST IR 8259 and ETSI EN 303 645 provide IoT security baselines: secure boot, updates, data protection. Critical for IoT security architecture questions.
Answer: Forum / Index
ITU Global Cybersecurity Index assesses national cybersecurity commitment; forums facilitate knowledge sharing. India ranks high in GCI. Critical for international cybersecurity questions.