Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: NISAR
NISAR (NASA-ISRO Synthetic Aperture Radar) is a joint Earth-observation satellite using dual-frequency radar to monitor ecosystems, ice masses, vegetation, and natural hazards. Scheduled for launch in 2024, it will provide unprecedented data for climate science and disaster management globally.
Answer: SWAYAM
SWAYAM (Study Webs of Active-Learning for Young Aspiring Minds) is a MOOC platform offering free online courses from 9th grade to post-graduation by reputed Indian institutions. Credits earned can be transferred to academic records. Part of Digital India's education transformation initiatives.
Answer: VoLTE
VoLTE (Voice over LTE) transmits voice as IP packets over 4G data network, enabling simultaneous voice calls and high-speed internet without dropping to 3G/2G. Provides HD voice quality, faster call setup, and improved battery life. Requires compatible device, SIM, and network support.
Answer: True
Unicode is a universal character encoding standard supporting over 149,000 characters from 161 scripts, plus symbols, emojis, and historical scripts. Replaces legacy encodings (ASCII, ISO-8859) that supported limited languages. UTF-8 is the dominant Unicode encoding on the web and modern systems.
Answer: Digital Signature
Digital Signatures use public-key cryptography to verify message integrity (not altered) and authenticity (sender identity). Based on hashing and asymmetric encryption. Used in software distribution, financial transactions, legal documents. Distinct from digital certificates which bind public keys to identities.
Answer: Responsible
Responsible AI encompasses principles and practices to ensure AI systems are developed and deployed ethically: fairness (avoiding bias), accountability (clear responsibility), transparency (explainable decisions), privacy protection, and human oversight. India's AI strategy emphasizes Responsible AI for inclusive growth.
Answer: AePS
AePS (Aadhaar Enabled Payment System) uses Aadhaar number and biometric authentication (fingerprint/iris) for cash withdrawal, deposit, balance inquiry, and fund transfer at Micro-ATMs. Operated by NPCI, it enables banking services for citizens without cards, phones, or internet connectivity.
Answer: True
Proxy servers act as intermediaries between client and internet, masking the user's real IP address. By connecting through a proxy in another country, users can access geo-restricted content. However, many services now detect and block proxy/VPN traffic. Legal and policy considerations apply.
Answer: Windows OS
System software manages hardware and provides platform for applications. Examples: Operating Systems (Windows, Linux), device drivers, utilities, compilers. Application software performs user tasks: Word (document editing), Chrome (web browsing), VLC (media playback). OS is foundational system software.
Answer: Worm
Computer Worm is standalone malware that self-replicates to spread across networks, exploiting vulnerabilities without requiring user action (unlike viruses that need host files). Worms can consume bandwidth, install backdoors, or deliver payloads. Prevention: network segmentation, patching, firewall rules.
Answer: SPADEX
SPADEX (Space Docking Experiment) is ISRO's technology demonstrator mission to master orbital docking/undocking, critical for future space station modules, satellite servicing, and human spaceflight. Successful docking enables complex missions requiring spacecraft to connect and transfer resources in orbit.
Answer: True
As per Rule 9A of Information Technology (Preservation and Retention of Information by Intermediaries providing Digital Locker facilities) Rules, 2016, documents issued by registered authorities through DigiLocker are legally valid and equivalent to physical originals under the IT Act, 2000.
Answer: COMMIT
COMMIT permanently saves all changes made during a transaction to the database. ROLLBACK undoes uncommitted changes. Transactions follow ACID properties (Atomicity, Consistency, Isolation, Durability). Proper use of COMMIT/ROLLBACK ensures data integrity in multi-user database environments.
Answer: Machine
Machine Learning enables systems to learn patterns from data and improve performance on tasks without explicit programming. Types: Supervised (labeled data), Unsupervised (pattern discovery), Reinforcement (reward-based learning). Applications: recommendation engines, fraud detection, predictive maintenance.
Answer: Subscriber Identity Module
SIM (Subscriber Identity Module) is a small chip that stores subscriber information, network authentication keys, contacts, and SMS. It identifies and authenticates users on cellular networks. eSIM is an embedded digital SIM that can be programmed remotely without physical card replacement.
Answer: True
Virtual memory is a memory management technique where the OS uses a portion of hard disk (page file/swap space) as an extension of physical RAM. Allows running programs larger than available RAM by swapping inactive pages to disk. Slower than physical RAM but enables multitasking and larger address spaces.
Answer: Phishing
Phishing is a social engineering attack where attackers impersonate legitimate entities via email/SMS to trick victims into revealing credentials or installing malware. Unlike technical exploits (buffer overflow, SQL injection), social engineering manipulates human psychology. Training and awareness are key defenses.
Answer: AePS
AePS (Aadhaar Enabled Payment System) allows bank customers to use Aadhaar number and fingerprint/iris for basic banking transactions at Micro-ATMs through Business Correspondents. Operated by NPCI, it promotes financial inclusion in rural areas without need for cards, phones, or internet.
Answer: SSH
SSH (Secure Shell) provides encrypted remote login and command execution over insecure networks. Replaces insecure Telnet which transmits data in plaintext. SSH uses public-key cryptography for authentication and supports port forwarding, file transfer (SFTP), and tunneling. Default port: 22.
Answer: False
Quantum computers threaten asymmetric algorithms like RSA and ECC using Shor's algorithm, but not all encryption. Symmetric algorithms (AES) require larger key sizes for quantum resistance. Post-Quantum Cryptography (PQC) is being standardized by NIST. Practical large-scale quantum computers capable of breaking encryption are still years away.