Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Federated Learning
Federated Learning trains models across devices/servers holding local data, sharing only model updates. Preserves privacy while enabling collaborative AI. Used in healthcare, finance, and mobile keyboards. Critical for privacy-preserving AI questions.
Answer: Direction 20
CERT-In Direction 20 (April 2022) requires service providers to report cyber incidents within 6 hours, maintain logs for 180 days, and synchronize clocks with National Time Server. Critical for incident response compliance questions.
Answer: Both A and B
e-Courts project integrates video conferencing for virtual hearings, e-filing, and case management. Enhanced during pandemic for access to justice. Critical for digital governance and judicial reform questions.
Answer: CSPM
CSPM (Cloud Security Posture Management) automates detection/remediation of misconfigurations (public S3 buckets, open ports). Critical for preventing cloud breaches. CWPP protects workloads; CASB governs SaaS; SIEM aggregates logs. Important for cloud security operations questions.
Answer: NIST Cybersecurity Framework
NIST CSF (Identify, Protect, Detect, Respond, Recover) provides flexible, risk-based approach to cybersecurity management. Widely adopted globally and referenced in Indian policies. Critical for security governance and compliance questions.
Answer: All of these
Smart buildings integrate IoT sensors (occupancy, temperature), BMS for HVAC/lighting control, and AI for predictive optimization. Reduces energy waste by 20-40%. Critical for green building and energy efficiency questions.
Answer: Physical Tampering
IoT devices are often deployed in accessible locations, vulnerable to physical tampering, theft, or environmental attacks. Requires hardware security modules, secure boot, and tamper-evident designs. Critical for IoT security architecture questions.
Answer: Blockchain/NFTs
Blockchain with NFTs (Non-Fungible Tokens) enables verifiable digital ownership, provenance tracking, and peer-to-peer transfers without intermediaries. Applications: art, gaming, identity, supply chain. Critical for understanding Web3 and digital economy questions.
Answer: DigiLocker
DigiLocker enables citizens to store/share government-issued documents (license, certificates) digitally. Documents have legal validity under IT Act. Integrates with Aadhaar for authentication. Critical for paperless governance and digital inclusion questions.
Answer: Object Detection
Object Detection identifies AND locates multiple objects with bounding boxes (YOLO, R-CNN). Image Classification assigns single label; Semantic Segmentation labels each pixel. Critical for autonomous vehicles, surveillance, and medical imaging applications.
Answer: All of these
Carbon tracking combines: IoT sensors (emission data), blockchain (immutable records), and AI (pattern analysis) for end-to-end footprint visibility. Enables carbon accounting, offset verification, and sustainable sourcing. Critical for ESG and climate governance questions.
Answer: Data Processing Near Source
Edge computing processes data close to IoT devices/sensors, reducing round-trip latency to cloud. Critical for autonomous vehicles, industrial automation, and AR/VR. Complements cloud for hierarchical processing. Key for distributed systems architecture questions.
Answer: W3C DID Specification
W3C DID Specification enables users to create/own identifiers without central authorities. DIDs resolve to DID Documents containing public keys and service endpoints. Foundation for portable, privacy-preserving identity in Web3 and metaverse. Critical for digital identity standards questions.
Answer: Account Aggregator
Account Aggregator framework enables consent-based financial data sharing between institutions. Users control data flow via AA apps. Part of India Stack's layered DPI: identity (Aadhaar), payments (UPI), data sharing (AA), documents (DigiLocker). Critical for digital governance questions.
Answer: Both A and B
Both GANs (Generative Adversarial Networks) and Diffusion Models (DALL-E, Stable Diffusion) generate images from text. GANs use generator-discriminator competition; diffusion models iteratively denoise random noise. Critical for understanding generative AI applications in creative industries and exams.
Answer: Ka-band
Ka-band (26.5-40 GHz) offers high bandwidth for satellite broadband, earth observation data downlink, and inter-satellite links. Challenges: rain attenuation, requiring adaptive coding. Critical for satellite communication and space infrastructure questions.
Answer: Vibration-to-Electricity Conversion
Piezoelectrics generate voltage when mechanically stressed, enabling energy harvesting from vibrations (machinery, footsteps, vehicles). Powers wireless sensors, wearables. India researches at IITs and DRDO. Critical for IoT and sustainable energy questions.
Answer: Time-of-Check-Time-of-Use
TOCTOU attacks exploit window between permission check and resource use, allowing privilege escalation or data corruption. Mitigation: atomic operations, locking, and careful design. Critical for secure coding and system security questions.
Answer: Levelized Cost of Storage
LCOS = (Total Lifetime Cost) / (Total Energy Delivered). Enables apples-to-apples comparison of storage technologies considering CAPEX, OPEX, efficiency, cycle life, and degradation. Critical for energy planning and investment decisions in policy exams.
Answer: Silicon Carbide
SiC offers: wide bandgap (high breakdown voltage), high thermal conductivity, and high-temperature operation vs silicon. Used in EV inverters, renewable inverters, industrial drives. India's semiconductor mission includes SiC/GaN compound semiconductors.