Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: DROP
DROP TABLE removes the entire table structure and all data permanently; cannot be rolled back in most systems. DELETE removes rows (can use WHERE, can be rolled back). TRUNCATE removes all rows quickly but keeps table structure. DROP is a DDL command; DELETE/TRUNCATE are DML commands.
Answer: True
Homomorphic encryption enables performing calculations on ciphertext, producing encrypted results that, when decrypted, match operations performed on plaintext. Critical for privacy-preserving cloud computing, secure voting, and confidential AI inference. Still computationally intensive but advancing with research and hardware acceleration.
Answer: EOS
EOS (Earth Observation Satellite) series includes satellites like EOS-01, EOS-03, EOS-04 for climate monitoring, agriculture, forestry, disaster management, and ocean studies. These satellites carry advanced sensors for multispectral, hyperspectral, and radar imaging to support sustainable development and environmental protection.
Answer: Platform
PaaS (Platform as a Service) provides development platforms (runtime, middleware, OS) managed by provider. Customers deploy and manage applications and data without worrying about infrastructure. Examples: Google App Engine, AWS Elastic Beanstalk, Azure App Service. Contrasts with IaaS (customer manages OS+) and SaaS (provider manages all).
Answer: OCEN
OCEN (Open Credit Enablement Network) is a protocol that standardizes interactions between Lenders, Loan Service Providers (LSPs), and Account Aggregators. It enables MSMEs and individuals to access credit using digital footprints (cash flow, GST, UPI) instead of traditional collateral, promoting financial inclusion.
Answer: True
Clustered index physically sorts table data rows based on index key values. Since data can be sorted in only one order, a table can have only one clustered index (usually on primary key). Non-clustered indexes store logical order separately with pointers to data rows; multiple non-clustered indexes are allowed.
Answer: Direction 20
CERT-In Direction 20 (April 2022) mandates service providers, intermediaries, and data centers to report cyber incidents within 6 hours of noticing. Also requires maintaining logs for 180 days, KYC for VPN users, and time synchronization. Aimed at improving incident response and threat intelligence sharing.
Answer: Account Aggregator
Account Aggregator (AA) is a consent-based data sharing framework regulated by RBI. It allows individuals to securely share financial information (bank statements, investments, insurance) between Financial Information Providers (FIPs) and Financial Information Users (FIUs) for better credit access and personalized services.
Answer: MeghRaj (GI Cloud)
MeghRaj (GI Cloud) is India's government cloud initiative launched by MeitY to optimize ICT spending, ensure data sovereignty, and provide secure, scalable cloud services to government entities. It empanels certified cloud service providers and defines standards for security, interoperability, and portability.
Answer: True
Aditya-L1 orbits the Sun-Earth L1 Lagrange point (~1.5 million km from Earth), where gravitational forces balance, allowing uninterrupted solar observation. This position avoids Earth's shadow, enabling 24/7 monitoring of solar activities, coronal mass ejections, and space weather forecasting.
Answer: Double extortion ransomware
Double extortion ransomware combines file encryption with data theft. Attackers threaten to publish sensitive data if ransom isn't paid, increasing pressure on victims. This evolved tactic makes backups insufficient as a sole defense. Prevention requires DLP, encryption, network segmentation, and incident response planning.
Answer: ONDC
ONDC (Open Network for Digital Commerce) is a government-backed initiative to create an open, interoperable network for e-commerce. It allows buyers and sellers to transact across platforms without being locked into a single app, promoting competition, inclusion, and democratization of digital commerce.
Answer: False
The shared responsibility model states: Cloud provider is responsible for security 'OF' the cloud (infrastructure, hardware, physical security). Customer is responsible for security 'IN' the cloud (data, applications, access management, OS patching in IaaS). Responsibilities vary by service model (IaaS/PaaS/SaaS).
Answer: B-Tree Index
B-Tree indexes maintain sorted data and allow efficient range queries, equality searches, and ordered retrieval. Hash indexes are optimal only for exact match lookups. Bitmap indexes work well for low-cardinality columns. Inverted indexes are used in full-text search engines.
Answer: True
Offline mode enables transactions without internet, synchronizing when online.
Answer: All of these
Urban air quality combines IoT, satellites, AI for source attribution.
Answer: Footprint
Carbon footprint measures total GHG emissions from IT operations.
Answer: True
Carbon credits traded in compliance and voluntary markets.
Answer: NISAR
NISAR is joint Earth-observation satellite using dual-frequency radar.
Answer: Diversity
Ground station diversity hands off between stations as satellites move.