Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Uniform Resource Locator
URL (Uniform Resource Locator) is the address used to access resources on the internet. It includes protocol (http/https), domain name, path, and optional parameters. Example: https://www.example.com/page?query=1. URLs are a subset of URIs (Uniform Resource Identifiers).
Answer: Using 12+ characters with mix of types
Strong passwords should be at least 12 characters long with uppercase, lowercase, numbers, and special symbols. Avoid personal info, dictionary words, or patterns. Use unique passwords per account and store them in a password manager. Enable two-factor authentication for critical accounts.
Answer: GSLV Mk III
GSLV Mk III (now called LVM3) is ISRO's heavy-lift launch vehicle capable of placing 4-ton class satellites into GTO. It was used for Chandrayaan-2, Chandrayaan-3, and OneWeb satellite launches. PSLV handles lighter polar orbits; SSLV is for small satellites; ASLV was retired.
Answer: IMPS
IMPS (Immediate Payment Service) enables instant interbank electronic fund transfer 24x7 using mobile number + MMID (Mobile Money Identifier) or account number + IFSC. Developed by NPCI, it supports transfers up to ₹5 lakh. NEFT/RTGS have timing restrictions; ECS is for bulk/recurring payments.
Answer: Fingerprint
Authentication factors: 1) Something you know (password/PIN), 2) Something you have (smart card/token), 3) Something you are (biometrics like fingerprint, iris, face). Multi-factor authentication combines two or more factors for enhanced security. Fingerprint is a biometric ('something you are') factor.
Answer: .exe
.exe (executable) files contain programs that can be run directly by the Windows operating system. Users should be cautious opening .exe files from untrusted sources as they can contain malware. Other extensions: .txt (text), .pdf (document), .jpg (image) are data files, not executables.
Answer: MyGov
MyGov is a citizen engagement platform launched under Digital India that allows Indians to participate in policy discussions, submit ideas, vote on proposals, and provide feedback on government initiatives. It fosters collaborative governance and transparent decision-making.
Answer: CARTOSAT
CARTOSAT series satellites are dedicated to Earth observation and remote sensing with high-resolution cameras for cartography, urban planning, and resource monitoring. INSAT is for communication/weather, GSAT for communication, and IRNSS/NavIC for navigation.
Answer: Generative Adversarial Networks
GANs (Generative Adversarial Networks) consist of two neural networks - a generator that creates fake data and a discriminator that evaluates authenticity. They compete to improve output quality. Used in deepfakes, art generation, drug discovery, and data augmentation. Ethical concerns include misinformation.
Answer: HAVING
HAVING clause filters results after GROUP BY aggregation, while WHERE filters rows before grouping. Example: SELECT dept, AVG(salary) FROM emp GROUP BY dept HAVING AVG(salary) > 50000. WHERE cannot be used with aggregate functions directly.
Answer: NFC
NFC (Near Field Communication) enables contactless payments by allowing two devices to communicate when placed within 4 cm. Used in Google Pay, Apple Pay, and RuPay Contactless. It operates at 13.56 MHz and supports secure element storage for payment credentials.
Answer: e-Kranti
e-Kranti (National e-Governance Plan 2.0) is a pillar of Digital India focusing on electronic delivery of government services across sectors like education, health, agriculture, and justice. It emphasizes integrated services, cloud adoption, and mobile-first approach for citizen convenience.
Answer: Asymmetric Encryption
Asymmetric Encryption (Public-Key Cryptography) uses two mathematically related keys: public key for encryption and private key for decryption. Examples include RSA, ECC, and Diffie-Hellman. It enables secure key exchange and digital signatures, unlike symmetric encryption which uses a single shared key.
Answer: All of these
Modern crypto regulation focuses on economic substance: payment tokens, security tokens, utility tokens regulated by function. Avoids technology lock-in and adapts to innovation. Critical for policy design.
Answer: FIU-IND
Financial Intelligence Unit-India (FIU-IND) receives, analyzes, and disseminates financial intelligence including crypto transactions. VASPs must register and report suspicious activities under PMLA.
Answer: All of these
Carbon credit integrity: additionality proves reductions beyond business-as-usual; robust baselines define counterfactual; independent verification ensures accuracy. Critical for market credibility.
Answer: Both A and B
Carbon-aware computing: schedule batch jobs when grid renewable fraction is highest, use geographic load balancing to low-carbon regions. Critical for sustainable cloud operations.
Answer: All of these
Urban air quality monitoring: IoT sensors for hyperlocal data, satellites for regional patterns, AI for source attribution and forecasting. Critical for public health and environmental policy.
Answer: Both A and B
High-Throughput Satellites (HTS) with Ka-band provide 100+ Gbps capacity for 5G backhaul in remote areas. Critical for bridging digital divide and supporting mobile network expansion.
Answer: Both A and B
Programmable CBDC enables subsidies usable only for specific goods/services (food, education), preventing misuse while ensuring benefits reach intended purposes. Critical for social welfare efficiency.