Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Shor's Algorithm
Shor's Algorithm factors integers in polynomial time on quantum computers, breaking RSA which relies on factoring difficulty. Requires fault-tolerant quantum computers not yet available.
Answer: Board
Data Protection Board of India is independent regulatory body established under DPDP Act 2023 to adjudicate disputes, impose penalties, enforce compliance.
Answer: True
DPDP Act governs processing of digital personal data: (1) within India, and (2) outside India if offering goods/services or profiling individuals in India.
Answer: Differential
Differential Privacy mathematically guarantees that model outputs don't reveal whether specific individuals were in training data. Critical for privacy-preserving ML deployment.
Answer: True
Model inversion exploits model predictions to infer sensitive training data attributes. Mitigation: differential privacy, output perturbation, access controls. Critical for privacy-preserving ML.
Answer: Adversarial Examples
Adversarial examples add imperceptible perturbations to inputs that cause ML models to misclassify. Critical vulnerability for computer vision, NLP systems requiring robust defenses.
Answer: Multi-Region Active-Active
Active-active architecture runs full workload in multiple regions simultaneously, enabling instant failover with zero RPO/RTO. Critical for mission-critical systems requiring maximum resilience.
Answer: UMANG
UMANG (Unified Mobile Application for New-age Governance) is a single app providing access to 1,200+ central and state services: Aadhaar, PAN, EPFO, utilities, education, health. Features: multilingual support, voice search, offline access. MyGov is for engagement; DigiLocker for documents; UMANG for service delivery.
Answer: Breach
Security Breach is an incident where unauthorized access, disclosure, alteration, or destruction of data occurs. Requires immediate containment, investigation, notification (as per laws like DPDP Act 2023), and remediation. Prevention: defense-in-depth, monitoring, incident response planning, and employee training.
Answer: Inkjet
Inkjet printers spray tiny ink droplets without physical contact with paper (non-impact). Laser printers use toner and electrostatic charges. Impact printers (Dot Matrix, Daisy Wheel, Line) strike ribbon against paper, producing noise but capable of multi-part forms. Inkjet/Laser dominate home/office use.
Answer: True
UPI Lite is an on-device wallet for small transactions (up to ₹500 per transaction, ₹4000 daily balance). Allows PIN-less payments for quick checkout at merchants, reducing dependency on bank server availability. Balance is loaded from linked bank account; ideal for transit, food, and micro-payments.
Answer: Local Area Network
LAN (Local Area Network) connects devices within a limited area like home, office, or campus using Ethernet or Wi-Fi. Enables resource sharing (printers, files) and internet access. Contrasted with WAN (Wide Area Network) like internet that spans large geographic distances.
Answer: Collaborative
Collaborative Filtering recommends items by analyzing patterns from similar users (user-based) or similar items (item-based). Used by Amazon, Netflix, Spotify. Hybrid systems combine with content-based filtering. Privacy-preserving techniques like federated learning are emerging to protect user data while personalizing recommendations.
Answer: SDSC-SHAR
SDSC-SHAR (Satish Dhawan Space Centre - Sriharikota) is ISRO's primary launch port in Andhra Pradesh. Handles all satellite and human spaceflight launches from Indian soil. Named after former ISRO chairman. Strategic coastal location enables safe launch trajectories over Bay of Bengal.
Answer: True
Network Slicing in 5G allows operators to create multiple virtual networks on shared physical infrastructure, each optimized for specific requirements (low latency for autonomous vehicles, high bandwidth for video, massive IoT for sensors). Enables customized QoS and efficient resource utilization.
Answer: Both B and C
Hashing (e.g., SHA-256) generates fixed-size digest to detect changes; any modification alters the hash. Digital Signatures combine hashing with asymmetric encryption to also verify sender identity and provide non-repudiation. Both ensure integrity; signatures add authentication and legal validity.
Answer: PM-WANI / BharatNet
PM-WANI enables public Wi-Fi hotspots via PDOs for affordable internet access. BharatNet provides fiber backbone to gram panchayats. Combined, they support digital education initiatives like DIKSHA, SWAYAM, and e-Pathshala, bridging the digital divide for rural students during remote learning.
Answer: .xlsx
.xlsx is the default extension for Excel workbooks (XML-based format introduced in Office 2007). Older .xls format is binary. Other extensions: .docx (Word), .pptx (PowerPoint), .pdf (portable document). File extensions help OS identify appropriate applications for opening files.
Answer: True
Additive Manufacturing (AM) builds objects layer-by-layer from digital models, contrasting with subtractive methods (cutting/drilling). 3D printing is a common AM technique. Applications: prototyping, custom medical implants, aerospace parts, and on-demand manufacturing. India promotes AM under Make in India.
Answer: 2NF
Second Normal Form (2NF) requires: 1) Table is in 1NF, and 2) No partial dependency (non-key attributes must depend on entire primary key, not part of composite key). Eliminates redundancy from partial dependencies. Further normalization to 3NF removes transitive dependencies.