Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Both A and B
Auto-scaling adjusts resource count based on CPU, memory, or custom metrics; load balancing distributes traffic across instances. Combined for elastic, resilient cloud applications.
Answer: Both A and B
Vulnerability scanners (Nessus, Qualys, OpenVAS) identify security weaknesses, prioritize by risk, and track remediation. Critical for proactive security posture management.
Answer: Both A and B
Data drift: input feature distribution changes; concept drift: relationship between features and target changes. Monitoring both enables timely model retraining. Critical for production ML reliability.
Answer: RAG
Retrieval-Augmented Generation (RAG) combines LLMs with vector database retrieval, grounding responses in verified sources. Reduces hallucinations and enables knowledge updates without retraining.
Answer: Both A and B
ISO/IEC 24760 provides identity management framework; W3C DID enables decentralized identifiers. Both support interoperable, privacy-preserving digital identity systems. Critical for identity policy questions.
Answer: Both A and B
Digital India encourages FOSS adoption for cost-effectiveness, security, and vendor independence. MeitY's FOSS policy provides guidelines for government use. Critical for sustainable digital governance.
Answer: SMOTE
SMOTE (Synthetic Minority Over-sampling Technique) creates synthetic examples by interpolating between minority class neighbors. Improves classifier performance on imbalanced data vs simple oversampling.
Answer: Scatter Plot
Scatter plots display individual data points for two variables, revealing correlations, clusters, and outliers. Foundation for regression analysis and exploratory data science.
Answer: All of these
Data splitting strategies: holdout (simple split), cross-validation (multiple folds), bootstrap (resampling). Critical for reliable model evaluation and generalization assessment.
Answer: Event-Driven Architecture
Event-driven architecture uses message brokers (Kafka, RabbitMQ) for asynchronous, decoupled service communication. Enables scalability, resilience, and real-time processing. Critical for modern distributed systems.
Answer: CaaS
CaaS (Container as a Service) provides managed Kubernetes (EKS, AKS, GKE) for container deployment, scaling, and management. Abstracts infrastructure while retaining control. Critical for cloud-native development.
Answer: All of these
Malware analysis combines: static (code inspection), dynamic (runtime behavior), sandboxing (isolated execution). Critical for threat intelligence and incident response.
Answer: Anomaly-based
Anomaly detection establishes baselines of normal behavior and flags deviations, enabling zero-day threat detection. Critical for advanced threat protection in modern SOCs.
Answer: All of these
Responsible MLOps: model cards document limitations, fairness audits detect bias across groups, A/B testing validates real-world impact. Critical for ethical AI deployment.
Answer: RLHF
Reinforcement Learning from Human Feedback (RLHF) trains reward models from human rankings, then optimizes LLM to maximize rewards. Critical for aligning AI with human values and safety.
Answer: All of these
Effective tech policy: technology-neutral (focus on outcomes), proportionate to risks, adaptable to innovation. Balances consumer protection with innovation incentives. Critical for policy design.
Answer: TSDSI
Telecommunications Standards Development Society, India (TSDSI) develops indigenous telecom standards, represents India in 3GPP, ITU. Critical for technology sovereignty and 5G/6G leadership.
Answer: Multiple Imputation
Multiple imputation creates several completed datasets with different plausible values for missing data, analyzing each and combining results. Accounts for uncertainty vs single imputation methods.
Answer: PCA
Principal Component Analysis (PCA) transforms features into orthogonal components ordered by variance explained. Enables visualization, noise reduction, and faster model training.
Answer: Histogram
Histograms bin continuous data to show frequency distribution, revealing skewness, outliers, and modality. Critical for exploratory data analysis and statistical understanding.