Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Quantum
Quantum annealing uses quantum tunneling to find global minima in optimization landscapes. Suitable for logistics, finance, machine learning. Different from gate-based quantum computing.
Answer: Tokenization
Tokenization replaces sensitive values with format-preserving tokens, reversible via secure vault. Used in payments, healthcare for PCI-DSS compliance.
Answer: True
Right to Erasure (Right to be Forgotten) allows individuals to request deletion when data no longer necessary or consent withdrawn. Critical for privacy compliance.
Answer: Inversion
Model inversion exploits model outputs to infer sensitive training data attributes. Critical privacy risk for ML systems handling personal data.
Answer: True
Data poisoning injects malicious samples into training data to cause targeted misclassifications or backdoors. Mitigation: data validation, robust training, anomaly detection.
Answer: Both A and B
Adversarial training includes adversarial examples in training data; defensive distillation smooths model outputs. Both improve robustness against adversarial attacks.
Answer: Canary
Canary Release deploys new version to small user subset, monitors metrics, gradually expands if stable. Reduces risk vs big-bang releases.
Answer: SPADEX
SPADEX (Space Docking Experiment) successfully demonstrated autonomous rendezvous and docking of two spacecraft in Earth orbit.
Answer: T-Hub
T-Hub (Telangana) is India's largest innovation campus, connecting startups with corporates, investors, mentors. Supports deep tech, healthtech, enterprise solutions.
Answer: Uniswap
Uniswap uses automated market maker (AMM) model with liquidity pools instead of order books. Enables permissionless token trading with constant product formula.
Answer: All of these
Renewable integration combines SCADA for control, IoT sensors for real-time data, AI forecasting for generation prediction. Critical for grid stability with high renewable penetration.
Answer: Shukrayaan-1
Shukrayaan-1 is India's planned Venus orbiter mission (target launch ~2028) to study the planet's thick atmosphere, surface processes, and solar wind interactions.
Answer: Ka
Ka-band (26.5-40 GHz) offers high bandwidth for satellite broadband but susceptible to rain attenuation. Requires adaptive coding and ground station diversity.
Answer: Neuromorphic Computing
Neuromorphic chips (Intel Loihi, IBM TrueNorth) use spiking neural networks and event-driven processing for orders-of-magnitude better energy efficiency than GPUs for AI tasks.
Answer: Shor's Algorithm
Shor's Algorithm factors integers in polynomial time on quantum computers, breaking RSA which relies on factoring difficulty. Requires fault-tolerant quantum computers not yet available.
Answer: Board
Data Protection Board of India is independent regulatory body established under DPDP Act 2023 to adjudicate disputes, impose penalties, enforce compliance.
Answer: True
DPDP Act governs processing of digital personal data: (1) within India, and (2) outside India if offering goods/services or profiling individuals in India.
Answer: Differential
Differential Privacy mathematically guarantees that model outputs don't reveal whether specific individuals were in training data. Critical for privacy-preserving ML deployment.
Answer: True
Model inversion exploits model predictions to infer sensitive training data attributes. Mitigation: differential privacy, output perturbation, access controls. Critical for privacy-preserving ML.
Answer: Adversarial Examples
Adversarial examples add imperceptible perturbations to inputs that cause ML models to misclassify. Critical vulnerability for computer vision, NLP systems requiring robust defenses.