Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: charset
<meta charset='UTF-8'> in HTML <head> specifies character encoding. UTF-8 supports virtually all languages and symbols. Proper encoding prevents display issues and security vulnerabilities like XSS. Fundamental for internationalization and web security awareness in exams.
Answer: du
du (disk usage) shows space used by files/directories. Common options: du -h (human-readable), du -sh /path (summary). df shows filesystem-level free space. Essential for storage management, identifying large files, and optimizing disk usage in system administration tasks.
Answer: Vehicle-to-Grid (V2G)
V2G allows EVs to discharge stored energy back to the grid during peak demand, acting as distributed storage. Supports grid stability, renewable integration, and provides revenue to EV owners. Requires smart chargers and regulatory framework. Emerging topic for energy and transportation questions.
Answer: True
DPDP Act has extraterritorial application: it governs processing of digital personal data (1) within India, and (2) outside India if it relates to offering goods/services or profiling individuals in India. Aligns with GDPR's approach. Critical for multinational compliance and data sovereignty questions.
Answer: All of these
Hash tables provide average-case O(1) for search, insert, and delete by computing index via hash function. Worst-case O(n) occurs with many collisions. Load factor < 0.75 and good hash functions maintain performance. Understanding complexity trade-offs is essential for algorithm design questions.
Answer: DOMContentLoaded / load
DOMContentLoaded fires when HTML is parsed (without waiting for styles/images); load fires when all resources (images, CSS) are fully loaded. Choosing appropriate event ensures scripts execute at right time. Critical for web performance and user experience optimization questions.
Answer: gzip
gzip compresses individual files using DEFLATE algorithm, producing .gz extension. tar bundles multiple files (often combined with gzip as .tar.gz). zip creates .zip archives compatible across platforms. Understanding compression tools is essential for backup, storage optimization, and file transfer in system administration.
Answer: True
GRIHA (Green Rating for Integrated Habitat Assessment) is India's national rating system for green buildings, developed by TERI and Ministry of New & Renewable Energy. Evaluates energy/water efficiency, waste management, and sustainable materials. LEED is an international alternative. Important for sustainable development questions.
Answer: Right to Correction
DPDP Act grants data principals rights including: access to summary of processed data, correction of inaccurate/incomplete data, erasure when purpose is fulfilled, and grievance redressal. These rights empower individuals and impose obligations on data fiduciaries. Critical for privacy compliance questions.
Answer: Tree / Acyclic Graph
A connected acyclic graph is a Tree; disconnected acyclic graph is a Forest. Cycles are paths that start and end at same node. Detecting cycles is important in dependency resolution, deadlock prevention, and network analysis. Graph theory fundamentals are tested in SSC JE and programming exams.
Answer: HTTPS
HTTPS (HTTP Secure) encrypts data using SSL/TLS to protect confidentiality and integrity during transmission. Essential for login pages, payments, and sensitive data. HTTP transmits in plaintext. Browsers mark non-HTTPS sites as 'Not Secure'. Fundamental for web security awareness in all government exams.
Answer: True
sudo (superuser do) grants temporary elevated privileges to authorized users as defined in /etc/sudoers. Promotes least-privilege security model by avoiding persistent root login. Users authenticate with their own password. Critical concept for secure system administration in technical exams.
Answer: Monocrystalline
Monocrystalline panels use single-crystal silicon, offering 15-22% efficiency and longer lifespan but higher cost. Polycrystalline is cheaper with 13-16% efficiency. Thin-film is flexible and lightweight but less efficient (10-13%). Choice depends on space, budget, and application. Relevant for renewable energy questions.
Answer: NIA / CBI Cyber Cell
While state police handle most cybercrime, National Investigation Agency (NIA) and CBI Cyber Crime Cell investigate major inter-state/international cyber offenses. Indian Cyber Crime Coordination Centre (I4C) under MHA coordinates response. Understanding jurisdiction and agencies is important for law enforcement questions.
Answer: Dijkstra
Dijkstra's algorithm finds shortest paths from a source node to all others in graphs with non-negative weights using a priority queue (O((V+E)log V)). Bellman-Ford handles negative weights; Floyd-Warshall finds all-pairs shortest paths; Kruskal is for minimum spanning tree. Classic graph algorithm for technical exams.
Answer: True
Flexbox handles one-dimensional layouts: arrange items in a row OR column with flexible sizing, alignment, and order. CSS Grid handles two-dimensional layouts (rows AND columns). Both are modern layout systems replacing floats/positioning. Understanding their use cases is important for responsive design questions.
Answer: man
man (manual) displays documentation for Linux commands, system calls, and configuration files. Example: man ls shows options and usage. help is for shell builtins; info provides hypertext docs; doc is not standard. Proficiency with man is essential for self-learning and troubleshooting in system administration.
Answer: Carbon
CCS (Carbon Capture and Storage) captures CO2 from power plants/industries, transports it, and stores underground or uses in products (concrete, fuels). Critical for decarbonizing hard-to-abate sectors. India is developing CCS roadmap as part of net-zero strategy. Emerging topic for environment and technology exams.
Answer: Direction 20
CERT-In Direction 20 (April 2022) requires service providers including VPNs to maintain logs of customer registration and usage for 180 days, report cyber incidents within 6 hours, and synchronize with NTP. Aimed at enhancing incident response and law enforcement capabilities. Important for cybersecurity compliance questions.
Answer: True
Hash tables use hash functions to map keys to array indices, enabling average O(1) operations. Worst-case O(n) occurs with many collisions (resolved via chaining/open addressing). Load factor and good hash functions maintain performance. Critical data structure for efficient lookups in real-world applications and exams.