Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: 2G
2G (specifically GPRS/EDGE enhancements) introduced packet-switched data transmission, enabling always-on internet access and efficient data usage. 1G was analog voice only; 3G improved data speeds; 4G introduced all-IP architecture with higher bandwidth.
Answer: Hyper Text Transfer Protocol Secure
HTTPS indicates that communication between browser and website is encrypted using SSL/TLS protocols. This protects data from eavesdropping and tampering. Users should look for the padlock icon and 'https://' when entering sensitive information online.
Answer: Quantum Computing
Quantum Computing uses qubits that can exist in superposition (0 and 1 simultaneously) and entanglement (correlated states) to solve certain problems exponentially faster than classical computers, with applications in cryptography, drug discovery, and optimization.
Answer: Scanner
Scanner is an input device that captures images, text, or objects and converts them into digital format. Monitor, printer, and speaker are output devices that display or present processed information to the user.
Answer: Mangalyaan
Mangalyaan (Mars Orbiter Mission), launched in 2013, made India the first Asian nation and fourth space agency globally to reach Mars orbit. It was completed at a cost of just $74 million, making it one of the least expensive Mars missions.
Answer: SELECT
SELECT is the SQL command used to query and retrieve data from one or more tables. INSERT adds new records, UPDATE modifies existing records, and DELETE removes records. SELECT is the most frequently used command in database operations.
Answer: AES
AES (Advanced Encryption Standard) is a symmetric algorithm using the same key for encryption and decryption. RSA, ECC, and Diffie-Hellman are asymmetric algorithms using public-private key pairs. AES is widely used for securing sensitive data.
Answer: DNS
DNS (Domain Name System) translates human-readable domain names into numerical IP addresses that computers use to identify each other on the network. Without DNS, users would need to remember IP addresses like 142.250.189.206.
Answer: PSLV
PSLV (Polar Satellite Launch Vehicle) is called ISRO's workhorse due to its reliability in launching earth observation and remote sensing satellites into polar sun-synchronous orbits. It has successfully launched Chandrayaan-1 and Mangalyaan.
Answer: RAM
RAM (Random Access Memory) is volatile memory used for temporary storage of data and machine code currently being used. It loses all data when power is switched off, unlike ROM or hard disk which are non-volatile.