Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Smart Contracts
Smart contracts are self-executing programs stored on blockchain that automatically enforce terms when conditions are satisfied. Used in DeFi, supply chain, insurance.
Answer: Supply Chain Traceability
Blockchain records each transaction/transfer in immutable ledger, enabling end-to-end visibility of product journey. Used for food safety, luxury goods authentication.
Answer: Chaos Engineering
Chaos Engineering (Netflix Chaos Monkey) proactively tests system resilience by injecting failures in controlled experiments. Builds confidence in fault tolerance.
Answer: Both A and B
Adapter/ACL patterns wrap external APIs, translating between internal models and external interfaces. Critical for maintainable integrations and testing.
Answer: Sharding
Sharding partitions data horizontally across nodes based on key ranges or hashes, enabling horizontal scaling. Critical for handling large datasets in distributed databases.
Answer: All of these
NIDHI-PRAYAS (DST) funds prototyping; Startup India offers tax benefits; AIM establishes incubators. Together support innovation from ideation to scale.
Answer: All of these
Immersive tech: VR (fully virtual), AR (overlay on real world), MR (blend virtual/real). Applications: training, education, entertainment, remote collaboration.
Answer: Both A and B
CIS Benchmarks provide hardening guidelines; NIST SP 800-190 covers container security lifecycle. Critical for cloud-native security.
Answer: Both A and B
OWASP API Top 10 lists common API vulnerabilities; NIST SP 800-204 provides security guidelines for microservices APIs. Critical for API security design.
Answer: DigiLocker
DigiLocker enables citizens to store/share government-issued documents digitally. Documents have legal validity under IT Act. Integrates with Aadhaar for authentication.
Answer: Both A and B
OWASP Application Security Verification Standard (ASVS) and ISO 27034 provide frameworks for secure software development, testing, and vulnerability management.
Answer: CPGRAMS
CPGRAMS (Centralized Public Grievance Redress and Monitoring System) enables online lodging and tracking of grievances against central government ministries/departments.
Answer: W3C
World Wide Web Consortium (W3C) develops web standards ensuring interoperability, accessibility, innovation. India participates through W3C India office.
Answer: UMANG
UMANG (Unified Mobile Application for New-age Governance) offers 1,200+ services: Aadhaar, PAN, EPFO, utilities, health. Multilingual, voice search, offline access.
Answer: Anomaly Detection
Anomaly detection (Isolation Forest, Autoencoders, statistical methods) identifies outliers indicating fraud, failures, or novel events. Critical for security, monitoring, quality control.
Answer: Time Series Forecasting
Time series forecasting (ARIMA, Prophet, LSTM) models temporal patterns for demand prediction, anomaly detection, capacity planning. Critical for business planning and operations.
Answer: All of these
Proportion visualization: bar charts for clear comparison, pie charts for part-to-whole (limited categories), stacked bars for multiple groups. Choice depends on data and audience.
Answer: Transparency
Transparency (Explainable AI/XAI) ensures AI decisions can be interpreted by humans. Techniques: LIME, SHAP, attention visualization. Critical for trust, debugging, regulatory compliance.
Answer: Multi-Site Active-Active
Active-active runs full workload in multiple regions simultaneously, enabling instant failover with zero RPO/RTO. Highest cost but maximum resilience. Critical for mission-critical systems.
Answer: All of these
IaC (Terraform), Configuration Management (Ansible), GitOps all use version-controlled code to define infrastructure state. Enables repeatability, auditability, peer review, automated testing.