Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Multi-Region Active-Active
Active-active architecture runs full workload in multiple regions simultaneously, enabling instant failover with zero RPO/RTO. Critical for mission-critical systems requiring maximum resilience.
Answer: UMANG
UMANG (Unified Mobile Application for New-age Governance) is a single app providing access to 1,200+ central and state services: Aadhaar, PAN, EPFO, utilities, education, health. Features: multilingual support, voice search, offline access. MyGov is for engagement; DigiLocker for documents; UMANG for service delivery.
Answer: Breach
Security Breach is an incident where unauthorized access, disclosure, alteration, or destruction of data occurs. Requires immediate containment, investigation, notification (as per laws like DPDP Act 2023), and remediation. Prevention: defense-in-depth, monitoring, incident response planning, and employee training.
Answer: Inkjet
Inkjet printers spray tiny ink droplets without physical contact with paper (non-impact). Laser printers use toner and electrostatic charges. Impact printers (Dot Matrix, Daisy Wheel, Line) strike ribbon against paper, producing noise but capable of multi-part forms. Inkjet/Laser dominate home/office use.
Answer: True
UPI Lite is an on-device wallet for small transactions (up to ₹500 per transaction, ₹4000 daily balance). Allows PIN-less payments for quick checkout at merchants, reducing dependency on bank server availability. Balance is loaded from linked bank account; ideal for transit, food, and micro-payments.
Answer: Local Area Network
LAN (Local Area Network) connects devices within a limited area like home, office, or campus using Ethernet or Wi-Fi. Enables resource sharing (printers, files) and internet access. Contrasted with WAN (Wide Area Network) like internet that spans large geographic distances.
Answer: Collaborative
Collaborative Filtering recommends items by analyzing patterns from similar users (user-based) or similar items (item-based). Used by Amazon, Netflix, Spotify. Hybrid systems combine with content-based filtering. Privacy-preserving techniques like federated learning are emerging to protect user data while personalizing recommendations.
Answer: SDSC-SHAR
SDSC-SHAR (Satish Dhawan Space Centre - Sriharikota) is ISRO's primary launch port in Andhra Pradesh. Handles all satellite and human spaceflight launches from Indian soil. Named after former ISRO chairman. Strategic coastal location enables safe launch trajectories over Bay of Bengal.
Answer: True
Network Slicing in 5G allows operators to create multiple virtual networks on shared physical infrastructure, each optimized for specific requirements (low latency for autonomous vehicles, high bandwidth for video, massive IoT for sensors). Enables customized QoS and efficient resource utilization.
Answer: Both B and C
Hashing (e.g., SHA-256) generates fixed-size digest to detect changes; any modification alters the hash. Digital Signatures combine hashing with asymmetric encryption to also verify sender identity and provide non-repudiation. Both ensure integrity; signatures add authentication and legal validity.
Answer: PM-WANI / BharatNet
PM-WANI enables public Wi-Fi hotspots via PDOs for affordable internet access. BharatNet provides fiber backbone to gram panchayats. Combined, they support digital education initiatives like DIKSHA, SWAYAM, and e-Pathshala, bridging the digital divide for rural students during remote learning.
Answer: .xlsx
.xlsx is the default extension for Excel workbooks (XML-based format introduced in Office 2007). Older .xls format is binary. Other extensions: .docx (Word), .pptx (PowerPoint), .pdf (portable document). File extensions help OS identify appropriate applications for opening files.
Answer: True
Additive Manufacturing (AM) builds objects layer-by-layer from digital models, contrasting with subtractive methods (cutting/drilling). 3D printing is a common AM technique. Applications: prototyping, custom medical implants, aerospace parts, and on-demand manufacturing. India promotes AM under Make in India.
Answer: 2NF
Second Normal Form (2NF) requires: 1) Table is in 1NF, and 2) No partial dependency (non-key attributes must depend on entire primary key, not part of composite key). Eliminates redundancy from partial dependencies. Further normalization to 3NF removes transitive dependencies.
Answer: Dynamic
Dynamic Routing protocols (OSPF, BGP, EIGRP) automatically adjust paths based on network topology changes, congestion, or failures. Unlike static routing (manually configured), dynamic routing scales for large networks and provides redundancy. Essential for internet backbone and enterprise WANs.
Answer: Both A and B
Bharat QR and UPI QR are interoperable standards allowing merchants to display a single QR code accepted by all UPI apps and card networks. Eliminates need for multiple QR stickers. NPCI's standardization promotes cashless adoption at small merchants with low-cost acceptance infrastructure.
Answer: True
SSLV is ISRO's cost-effective launch vehicle for small satellites (up to 500 kg to LEO). Features: low cost, quick turnaround, minimal infrastructure. First successful mission SSLV-D3 (2024) demonstrated reliability. Caters to growing global demand for small satellite launches and technology demonstrations.
Answer: All of these
ICMP-based DoS attacks include: Ping Flood (direct echo request flood), Smurf Attack (spoofed broadcast amplification), and variants. Mitigation: rate limiting ICMP, disabling broadcast responses, ingress filtering, and DDoS protection services. Network monitoring detects abnormal traffic patterns.
Answer: Partitioning
Partitioning divides a physical disk into logical sections (partitions) that can be formatted with different file systems, used for multiple OS installations, or separate data organization. Tools: Disk Management (Windows), fdisk/gparted (Linux). Enables better organization, security, and recovery strategies.
Answer: IoT
IoT sensors (strain gauges, accelerometers, temperature) embedded in infrastructure monitor stress, vibrations, and environmental conditions in real-time. Data analytics predict maintenance needs and prevent failures. Critical for smart cities, disaster resilience, and extending asset lifespan with predictive maintenance.