Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Domain-Driven Design / DDD
DDD aligns software structure with business domains: entities, aggregates, bounded contexts. Improves maintainability and team autonomy. Critical for complex enterprise application design.
Answer: Replication
Replication maintains copies of data across nodes for fault tolerance and read scalability. Synchronous (strong consistency) vs asynchronous (eventual consistency). Critical for resilient database design.
Answer: True
TSN (IEEE 802.1) extends Ethernet for real-time control: time synchronization, traffic shaping, redundancy. Critical for Industry 4.0, autonomous vehicles, and critical infrastructure.
Answer: Both A and B
KAPILA (Knowledge Assessment and Processing for Innovation and IPR Literacy Awareness) and Innovation Ambassador program build IP culture in HEIs. Critical for academic innovation questions.
Answer: Modernisation Programme / DILRMP
DILRMP digitizes land records, integrates with Aadhaar, enables online mutation, and reduces disputes. Critical for property rights, credit access, and governance transparency.
Answer: All of these
Differential Privacy adds noise to aggregates; Federated Learning trains models on-device; SMPC computes jointly without sharing inputs. All enable privacy-preserving analytics. Critical for confidential data science questions.
Answer: True
Confidential Computing (Intel SGX, AMD SEV) encrypts data in memory during processing, protecting from OS/hypervisor attacks. Critical for multi-tenant cloud and privacy-sensitive workloads.
Answer: Both A and B
NIST SP 800-161 and ISO 27036 provide frameworks for supply chain risk management: vendor assessment, contract clauses, continuous monitoring. Critical for third-party risk governance questions.
Answer: Public Interest / Common Good
Digital Public Goods (UN definition) are open solutions addressing SDGs: health, education, finance. India contributes: MOSIP (identity), Sunbird (education), DIVOC (vaccination). Critical for global development questions.
Answer: All of these
PMP (PMI) covers traditional project management; PRINCE2 is process-based; Agile/Scrum certifications focus on iterative delivery. All valued for tech project leadership roles.
Answer: True
API Gateway abstracts microservices complexity: request routing, authentication, rate limiting, caching, monitoring. Critical for secure, manageable microservices architectures.
Answer: Caching
Caching (Redis, Memcached) stores hot data in RAM for sub-millisecond access, reducing database load. Critical for high-traffic applications. Trade-offs: cache invalidation, consistency.
Answer: P4 / Programmable
P4 (Programming Protocol-Independent Packet Processors) enables custom packet processing logic in switches/routers. Supports innovation in telemetry, security, and traffic engineering. Critical for next-gen network research questions.
Answer: Fund of Funds for Startups
FFS (₹10,000 crore) managed by SIDBI invests in AIFs that fund startups. Focuses on innovation, job creation, strategic sectors. Part of Startup India ecosystem support.
Answer: True
Digital India (launched 2015) has three pillars: digital infrastructure as utility, governance & services on demand, digital empowerment of citizens. Encompasses Aadhaar, UPI, DigiLocker, BharatNet, etc.
Answer: Anonymization
Anonymization irreversibly removes/alters PII to prevent re-identification. Techniques: k-anonymity, l-diversity, differential privacy. Critical for privacy-preserving analytics and GDPR/DPDP compliance.
Answer: End-to-End / Comprehensive
End-to-end encryption protects data throughout lifecycle: at rest (storage), in transit (network), in use (processing via confidential computing). Critical for data protection and compliance questions.
Answer: IEC 62443
IEC 62443 provides cybersecurity standards for industrial automation and control systems (IACS). Addresses OT-specific threats: safety, availability, integrity. Critical for critical infrastructure protection questions.
Answer: True
Geopolitical tensions and pandemic disruptions drove policies: US CHIPS Act, EU Chips Act, India Semiconductor Mission. Aim to reduce concentration risk and ensure strategic autonomy. Critical for tech geopolitics questions.
Answer: DevOps Engineer
DevOps Engineers use IaC (Terraform, Ansible), CI/CD, and monitoring to automate infrastructure. Critical for cloud operations and agile delivery. High demand in Indian tech sector.