Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: All of these
Managed Kubernetes: EKS (AWS), AKS (Azure), GKE (GCP) handle control plane, updates, scaling. Abstracts infrastructure while retaining container flexibility. Critical for cloud-native development.
Answer: All of these
Resilience patterns: self-healing replaces failed instances, circuit breaker prevents cascading failures, retry logic handles transient errors. Combined for fault-tolerant cloud applications.
Answer: Data Protection Board
Data Protection Board of India (under DPDP Act 2023) adjudicates disputes, imposes penalties, enforces compliance. Distinct from CERT-In (cyber incidents) and MeitY (policy).
Answer: Both A and B
High-dimensional handling: dimensionality reduction (PCA, autoencoders) compresses features; sparse representations (L1 regularization) select relevant features. Critical for text, recommendation systems.
Answer: Both A and B
Time series visualization: line charts show trends clearly, area charts emphasize volume. Both effective for temporal data analysis and forecasting communication.
Answer: Both A and B
Managed API gateways (AWS API Gateway, GCP Endpoints) handle routing, auth, throttling, monitoring. Critical for secure, scalable microservices exposure.
Answer: Both A and B
SIEM platforms aggregate logs from network, endpoint, application sources, enabling correlation, alerting, and investigation. Foundation for modern security operations.
Answer: Both A and B
Fairness testing: bias audits detect disparate impact, fairness metrics (demographic parity, equalized odds) quantify equity. Critical for ethical AI deployment in regulated sectors.
Answer: RAG
Retrieval-Augmented Generation (RAG) combines LLMs with vector search over document collections, grounding responses in verified sources. Reduces hallucinations and enables knowledge updates.
Answer: Both A and B
Digital Public Goods Alliance curates open-source solutions; G20 DPI Framework promotes interoperable identity, payments, data sharing. India leads global DPI advocacy.
Answer: All of these
Digital India ecosystem: UMANG for service delivery, MyGov for citizen engagement, DigiLocker for documents. Integrated approach for inclusive digital governance.
Answer: Model-Based Imputation
Model-based imputation (MICE, Bayesian) models relationships between variables to predict missing values, accounting for uncertainty. More robust than simple methods for complex missingness patterns.
Answer: Both A and B
Box plots show median, quartiles, outliers; violin plots add density estimation. Both effective for comparing distributions across categories. Critical for exploratory data analysis.
Answer: Event-Driven Architecture
Event-driven architecture uses message brokers (Kafka, RabbitMQ) for decoupled, asynchronous service communication. Enables scalability, resilience, and real-time processing.
Answer: Both A and B
Managed databases (AWS RDS, GCP Cloud SQL) handle provisioning, patching, backups, scaling. Reduces operational overhead vs self-managed databases. Critical for cloud application development.
Answer: Both A and B
Email security combines: SPF/DKIM for authentication, ML for content analysis, heuristics for known patterns. Layered defense critical for phishing protection.
Answer: Both A and B
MLOps tools: DVC versions data and models, MLflow tracks experiments and deployments. Combined with Git for end-to-end reproducibility. Critical for enterprise ML governance.
Answer: Both A and B
Structured output: function calling defines schemas for LLM responses, parsing libraries validate/extract structured data. Critical for integrating LLMs with APIs and databases.
Answer: All of these
Effective tech policy: proportionate to actual risks, technology-neutral (focus on outcomes), risk-based (higher scrutiny for higher-risk activities). Critical for balanced policy design.
Answer: Both A and B
CERT-In handles cyber incident response; NCIIPC (National Critical Information Infrastructure Protection Centre) protects critical infrastructure. Both under MeitY for cybersecurity governance.