GK Questions

Filter by category, type, and difficulty. Reading is open for everyone.

Showing 601–620 of 710 questions
technology medium mcq

Which technique enables machine learning on decentralized data without sharing raw datasets?

  1. Centralized Training
  2. Federated Learning
  3. Data Warehousing
  4. ETL
technology hard mcq

Which CERT-In direction mandates reporting of cybersecurity incidents within 6 hours?

  1. Direction 12
  2. Direction 20
  3. Direction 44
  4. Direction 66
technology medium mcq

Which platform enables video-based virtual court hearings in India?

  1. e-Courts
  2. Video Conferencing
  3. Both A and B
  4. None
technology medium mcq

Which framework provides guidelines for managing cybersecurity risk in organizations?

  1. ISO 9001
  2. NIST Cybersecurity Framework
  3. ITIL
  4. COBIT
technology medium mcq

Which technology optimizes energy consumption in buildings using sensors and AI?

  1. Smart Grids
  2. Building Management Systems
  3. IoT + AI Analytics
  4. All of these
technology medium mcq

Which security challenge is unique to IoT devices compared to traditional IT systems?

  1. Phishing Attacks
  2. Physical Tampering
  3. SQL Injection
  4. All of these
technology hard mcq

Which Web3 technology enables decentralized ownership and transfer of digital assets?

  1. Cloud Storage
  2. Blockchain/NFTs
  3. Centralized Databases
  4. APIs
technology medium mcq

Which India Stack component provides verified digital documents with legal validity?

  1. Aadhaar
  2. UPI
  3. DigiLocker
  4. e-Sign
technology medium mcq

Which computer vision task involves identifying and locating objects within images?

  1. Image Classification
  2. Object Detection
  3. Semantic Segmentation
  4. All of these
technology medium mcq

Which technology enables tracking of product carbon footprint across supply chains?

  1. Blockchain
  2. IoT Sensors
  3. AI Analytics
  4. All of these
technology medium mcq

Which edge computing benefit reduces latency for real-time applications?

  1. Centralized Processing
  2. Data Processing Near Source
  3. Cloud-Only Architecture
  4. Batch Processing
technology hard mcq

Which standard defines decentralized identifiers (DIDs) for self-sovereign digital identity?

  1. OAuth 2.0
  2. W3C DID Specification
  3. SAML
  4. OpenID Connect
technology medium mcq

Which component of India Stack enables consent-based sharing of personal data?

  1. Aadhaar
  2. UPI
  3. Account Aggregator
  4. DigiLocker
technology medium mcq

Which AI technique is used for generating realistic images from text descriptions?

  1. GANs
  2. Diffusion Models
  3. Both A and B
  4. Decision Trees
technology medium mcq

Which application uses piezoelectric materials for energy harvesting?

  1. Solar Panels
  2. Vibration-to-Electricity Conversion
  3. Wind Turbines
  4. Thermoelectric Generators
technology hard mcq

Which attack exploits race conditions in software to gain unauthorized privileges?

  1. Buffer Overflow
  2. Time-of-Check-Time-of-Use
  3. SQL Injection
  4. Cross-Site Scripting
technology medium mcq

Which metric compares the cost of storing one kilowatt-hour of energy over system lifetime?

  1. Energy Density
  2. Levelized Cost of Storage
  3. Round-Trip Efficiency
  4. Power Rating
technology medium mcq

Which semiconductor material is preferred for high-power, high-temperature applications?

  1. Silicon
  2. Gallium Arsenide
  3. Silicon Carbide
  4. Germanium