Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: DHCP
DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses, subnet masks, gateway, and DNS settings to devices joining a network. Eliminates manual configuration errors and simplifies network management. Uses DORA process: Discover, Offer, Request, Acknowledge.
Answer: Multi-Bank VPA
UPI allows linking multiple bank accounts to one Virtual Payment Address (VPA). Users can select default account or choose at transaction time. Simplifies management, enables fund routing flexibility, and maintains single identity across banks. Managed securely via NPCI's central switch.
Answer: True
Public Wi-Fi networks often lack encryption, allowing attackers on same network to intercept unencrypted traffic (HTTP, emails, credentials). VPN creates encrypted tunnel protecting data in transit. Best practice: avoid sensitive transactions on public Wi-Fi, use HTTPS, enable firewall, and connect via VPN.
Answer: Caps Lock
Caps Lock toggles alphabetic keys to produce uppercase letters without holding Shift. Shift produces uppercase only while pressed. Caps Lock indicator (LED) shows active state. Useful for typing headings or acronyms; accidental activation is a common user frustration.
Answer: Optical Fiber
Optical Fiber Communication transmits data as light pulses through glass/plastic fibers, offering high bandwidth, low attenuation, and immunity to electromagnetic interference. Backbone of modern internet, undersea cables, and BharatNet. Enables high-speed broadband, 5G backhaul, and data center interconnects.
Answer: True
e-KYC (Electronic Know Your Customer) uses Aadhaar authentication to verify identity digitally, reducing paperwork and processing time. Enabled for banking, telecom, pensions, and subsidies. Consent-based and secure, with audit trails. Supreme Court guidelines ensure privacy and purpose limitation.
Answer: JOIN
JOIN combines rows from multiple tables using related columns (usually primary/foreign keys). Types: INNER JOIN (matching rows), LEFT/RIGHT JOIN (all rows from one side), FULL OUTER JOIN (all rows). Essential for normalized database queries retrieving related data across tables.
Answer: Virtualization
Virtualization uses hypervisor software to create multiple virtual machines (VMs) on one physical server, each running independent OS. Improves resource utilization, enables testing, disaster recovery, and cloud infrastructure. Types: full virtualization, para-virtualization, containerization (Docker).
Answer: Disabling SSID broadcast
Disabling SSID broadcast hides network name from public scans, adding obscurity layer. However, strong security requires WPA3 encryption, complex password, MAC filtering, and regular firmware updates. WEP is broken; default passwords are easily guessable; open networks offer no protection.
Answer: True
Static IP is manually configured and remains constant, used for servers, printers, remote access. Dynamic IP is assigned by DHCP server and may change on reboot/lease expiry, typical for home users. Static IPs cost more but provide reliability for services requiring consistent addressing.
Answer: UPI AutoPay
UPI AutoPay enables mandate-based recurring payments for subscriptions (OTT, utilities, mutual funds). Users set amount, frequency, and validity; payments execute automatically without manual intervention each time. Enhances convenience while maintaining security with transaction limits and notifications.
Answer: F5 or Ctrl+R
F5 or Ctrl+R refreshes/reloads the current webpage to fetch latest content from server. Ctrl+F5 performs hard refresh bypassing cache. These shortcuts improve productivity when checking for updated information or troubleshooting loading issues.
Answer: All of these
Real-time translation combines: Speech Recognition (audio to text), NLP (translation between languages), and Speech Synthesis (text to audio). Advanced systems also use context understanding and lip-sync for natural output. Used in global collaboration tools and accessibility features.
Answer: True
Vikram lander (Chandrayaan-3) honors Dr. Vikram Sarabhai, father of India's space program. The rover was named 'Pragyan' (wisdom). Successful landing on Aug 23, 2023 made India the 4th nation to soft-land on Moon and first near south pole.
Answer: AES-256
AES-256 (Advanced Encryption Standard with 256-bit key) is approved by NIST for top-secret information. Provides strong security against brute-force attacks. DES/3DES are deprecated; RC4 has known vulnerabilities. AES is efficient in both hardware and software implementations.
Answer: PAHAL/MyLPG
PAHAL (Pratyaksh Hanstantrit Labh) is the DBT scheme for LPG subsidies, accessible via MyLPG app. Enables direct subsidy transfer to bank accounts, reducing leakage and ensuring benefits reach genuine beneficiaries.
Answer: FAME
FAME provides demand incentives for EVs and charging infrastructure. Phase-II focuses on public transport and shared mobility.
Answer: UEBA
UEBA uses ML to establish behavioral baselines and detect anomalies indicating compromised accounts or insider threats.
Answer: Multimodal
Multimodal models (CLIP, LLaVA) process text, images, audio jointly, enabling visual question answering, image captioning, and cross-modal retrieval.
Answer: All of these
Code LLMs (Codex, CodeLlama) trained on code repositories enable natural language to code generation. Combined with fine-tuning and prompt engineering for developer productivity tools.