Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Dynamic
Dynamic Routing protocols (OSPF, BGP, EIGRP) automatically adjust paths based on network topology changes, congestion, or failures. Unlike static routing (manually configured), dynamic routing scales for large networks and provides redundancy. Essential for internet backbone and enterprise WANs.
Answer: Both A and B
Bharat QR and UPI QR are interoperable standards allowing merchants to display a single QR code accepted by all UPI apps and card networks. Eliminates need for multiple QR stickers. NPCI's standardization promotes cashless adoption at small merchants with low-cost acceptance infrastructure.
Answer: True
SSLV is ISRO's cost-effective launch vehicle for small satellites (up to 500 kg to LEO). Features: low cost, quick turnaround, minimal infrastructure. First successful mission SSLV-D3 (2024) demonstrated reliability. Caters to growing global demand for small satellite launches and technology demonstrations.
Answer: All of these
ICMP-based DoS attacks include: Ping Flood (direct echo request flood), Smurf Attack (spoofed broadcast amplification), and variants. Mitigation: rate limiting ICMP, disabling broadcast responses, ingress filtering, and DDoS protection services. Network monitoring detects abnormal traffic patterns.
Answer: Partitioning
Partitioning divides a physical disk into logical sections (partitions) that can be formatted with different file systems, used for multiple OS installations, or separate data organization. Tools: Disk Management (Windows), fdisk/gparted (Linux). Enables better organization, security, and recovery strategies.
Answer: IoT
IoT sensors (strain gauges, accelerometers, temperature) embedded in infrastructure monitor stress, vibrations, and environmental conditions in real-time. Data analytics predict maintenance needs and prevent failures. Critical for smart cities, disaster resilience, and extending asset lifespan with predictive maintenance.
Answer: True
Ayushman Bharat Digital Mission (ABDM) assigns 14-digit ABHA (Ayushman Bharat Health Account) numbers as unique health IDs. Enables consent-based sharing of health records across providers, teleconsultations, and personalized care. Part of India's digital health infrastructure transformation.
Answer: 700 MHz
Lower frequency bands (like 700 MHz) have longer wavelengths that penetrate buildings and obstacles better, providing wider coverage with fewer towers. Higher bands (3.5 GHz, 26 GHz) offer higher capacity but shorter range, requiring denser infrastructure. 5G deployments use band combinations for coverage+capacity.
Answer: Access Control
Access Control Models define policies for subject-object interactions: DAC (owner-controlled), MAC (system-enforced labels), RBAC (role-based permissions), ABAC (attribute-based rules). Critical for enforcing least privilege and compliance in enterprise systems. Implemented via IAM solutions and directory services.
Answer: Switch
Switch operates at Data Link Layer (Layer 2), using MAC addresses to forward frames to specific ports within a LAN. More efficient than hubs (broadcast to all ports). Managed switches support VLANs, QoS, and security features. Routers operate at Layer 3 using IP addresses.
Answer: False
UPI transactions are instant and irrevocable once completed. Senders must verify recipient details before confirming. For erroneous transactions, users must contact recipient for refund or raise dispute with bank/NPCI. Always double-check VPA/amount before sending money via UPI.
Answer: USB
USB (Universal Serial Bus) is the standard port for keyboards, mice, and most peripherals. Replaced legacy PS/2 ports. USB-C offers reversible connector and higher power/data transfer. Wireless keyboards use Bluetooth or RF dongles, but USB remains universal for wired connections.
Answer: Drone
Drone Logistics uses unmanned aerial vehicles for last-mile delivery, especially in remote/hilly areas with poor road connectivity. India's Drone Rules 2021 facilitate commercial drone operations. Applications: medical supplies, e-commerce, agriculture spraying. Requires airspace management and safety protocols.
Answer: COUNT
COUNT() returns the number of rows that match a specified condition. COUNT(*) counts all rows; COUNT(column) counts non-NULL values. Used with GROUP BY for segmented counts. Other aggregates: SUM (total), AVG (mean), MIN/MAX (extremes). Essential for reporting and analytics queries.
Answer: True
PSLV has launched over 300 foreign satellites for 34+ countries, establishing ISRO as a reliable, cost-effective launch service provider. Notable missions: PSLV-C37 (104 satellites in one launch), PSLV-C44 (Microsat-R). Commercial launches generate revenue and foster international cooperation.
Answer: Inherence-based
Inherence-based authentication uses biometric traits inherent to the user: fingerprint, iris, face, voice, or behavioral patterns. Part of multi-factor authentication (MFA). Advantages: hard to lose/share; challenges: privacy concerns, spoofing risks, and accessibility for disabled users.
Answer: e-NAM
e-NAM (Electronic National Agriculture Market) is an online trading platform connecting APMC mandis across India. Enables transparent price discovery, wider market access, and reduced intermediation for farmers. Integrated with quality assaying, payment settlement, and logistics services for efficient agricultural trade.
Answer: VoIP
VoIP (Voice over Internet Protocol) transmits voice calls as data packets over IP networks (internet, LAN). Examples: WhatsApp calls, Zoom, Skype, corporate PBX. Advantages: lower cost, integration with apps, advanced features. Quality depends on bandwidth, latency, and jitter management.
Answer: True
CMOS (Complementary Metal-Oxide-Semiconductor) memory stores BIOS/UEFI settings (boot order, system time, hardware config) and is powered by a coin-cell battery (CR2032). If battery dies, settings reset to defaults and system clock loses time. Replacing battery restores persistent storage.
Answer: All of these
Anomaly detection uses: Supervised Learning (trained on labeled attacks), Unsupervised Learning (clustering normal vs abnormal patterns), and Reinforcement Learning (adaptive response to threats). Combined approaches improve detection of zero-day attacks and reduce false positives in SIEM systems.