Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: All of these
DeFi risks: smart contract bugs enable fund theft, oracle manipulation feeds false prices, impermanent loss affects liquidity providers. Critical for DeFi security understanding.
Answer: Lower Energy Consumption
Neuromorphic chips achieve orders-of-magnitude better energy efficiency by mimicking brain's event-driven, sparse computation. Critical for edge AI and sustainable computing.
Answer: Both A and B
Adversarial training includes adversarial examples in training data; defensive distillation smooths model outputs. Both improve robustness against adversarial attacks.
Answer: Uniswap
Uniswap uses automated market maker (AMM) model with liquidity pools instead of order books. Enables permissionless token trading with constant product formula.
Answer: All of these
Renewable integration combines SCADA for control, IoT sensors for real-time data, AI forecasting for generation prediction. Critical for grid stability with high renewable penetration.
Answer: Shukrayaan-1
Shukrayaan-1 is India's planned Venus orbiter mission (target launch ~2028) to study the planet's thick atmosphere, surface processes, and solar wind interactions.
Answer: Neuromorphic Computing
Neuromorphic chips (Intel Loihi, IBM TrueNorth) use spiking neural networks and event-driven processing for orders-of-magnitude better energy efficiency than GPUs for AI tasks.
Answer: Shor's Algorithm
Shor's Algorithm factors integers in polynomial time on quantum computers, breaking RSA which relies on factoring difficulty. Requires fault-tolerant quantum computers not yet available.
Answer: Adversarial Examples
Adversarial examples add imperceptible perturbations to inputs that cause ML models to misclassify. Critical vulnerability for computer vision, NLP systems requiring robust defenses.
Answer: Multi-Region Active-Active
Active-active architecture runs full workload in multiple regions simultaneously, enabling instant failover with zero RPO/RTO. Critical for mission-critical systems requiring maximum resilience.
Answer: UMANG
UMANG (Unified Mobile Application for New-age Governance) is a single app providing access to 1,200+ central and state services: Aadhaar, PAN, EPFO, utilities, education, health. Features: multilingual support, voice search, offline access. MyGov is for engagement; DigiLocker for documents; UMANG for service delivery.
Answer: Inkjet
Inkjet printers spray tiny ink droplets without physical contact with paper (non-impact). Laser printers use toner and electrostatic charges. Impact printers (Dot Matrix, Daisy Wheel, Line) strike ribbon against paper, producing noise but capable of multi-part forms. Inkjet/Laser dominate home/office use.
Answer: Local Area Network
LAN (Local Area Network) connects devices within a limited area like home, office, or campus using Ethernet or Wi-Fi. Enables resource sharing (printers, files) and internet access. Contrasted with WAN (Wide Area Network) like internet that spans large geographic distances.
Answer: SDSC-SHAR
SDSC-SHAR (Satish Dhawan Space Centre - Sriharikota) is ISRO's primary launch port in Andhra Pradesh. Handles all satellite and human spaceflight launches from Indian soil. Named after former ISRO chairman. Strategic coastal location enables safe launch trajectories over Bay of Bengal.
Answer: Both B and C
Hashing (e.g., SHA-256) generates fixed-size digest to detect changes; any modification alters the hash. Digital Signatures combine hashing with asymmetric encryption to also verify sender identity and provide non-repudiation. Both ensure integrity; signatures add authentication and legal validity.
Answer: .xlsx
.xlsx is the default extension for Excel workbooks (XML-based format introduced in Office 2007). Older .xls format is binary. Other extensions: .docx (Word), .pptx (PowerPoint), .pdf (portable document). File extensions help OS identify appropriate applications for opening files.
Answer: 2NF
Second Normal Form (2NF) requires: 1) Table is in 1NF, and 2) No partial dependency (non-key attributes must depend on entire primary key, not part of composite key). Eliminates redundancy from partial dependencies. Further normalization to 3NF removes transitive dependencies.
Answer: Both A and B
Bharat QR and UPI QR are interoperable standards allowing merchants to display a single QR code accepted by all UPI apps and card networks. Eliminates need for multiple QR stickers. NPCI's standardization promotes cashless adoption at small merchants with low-cost acceptance infrastructure.
Answer: All of these
ICMP-based DoS attacks include: Ping Flood (direct echo request flood), Smurf Attack (spoofed broadcast amplification), and variants. Mitigation: rate limiting ICMP, disabling broadcast responses, ingress filtering, and DDoS protection services. Network monitoring detects abnormal traffic patterns.
Answer: IoT
IoT sensors (strain gauges, accelerometers, temperature) embedded in infrastructure monitor stress, vibrations, and environmental conditions in real-time. Data analytics predict maintenance needs and prevent failures. Critical for smart cities, disaster resilience, and extending asset lifespan with predictive maintenance.