Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: All of these
Proportion visualization: bar charts for clear comparison, pie charts for part-to-whole (limited categories), stacked bars for multiple groups. Choice depends on data and audience.
Answer: Regularization
Regularization (L1/Lasso, L2/Ridge, Dropout) adds penalty terms to loss function or randomly drops units during training. Prevents overfitting by discouraging complex models. Critical for generalization.
Answer: All of these
Safe deployment patterns: blue-green (instant switch), canary (gradual rollout), feature flags (toggle functionality). Combined for zero-downtime, low-risk releases. Critical for DevOps practices.
Answer: True
IaC scanners (Checkov, tfsec) analyze Terraform/CloudFormation for misconfigurations: public storage, weak IAM, unencrypted resources. Critical for shift-left security in DevOps.
Answer: Glacier Deep Archive
Glacier Deep Archive offers lowest cost for long-term retention with 12+ hour retrieval times. Ideal for regulatory archives, backups. Trade-off: low storage cost vs high retrieval latency.
Answer: Red Team / Penetration
Red teaming conducts adversarial simulations (cyber, physical, social) to identify gaps in detection, response, and resilience. Distinct from vulnerability scanning. Critical for mature security programs.
Answer: UEBA
UEBA (User and Entity Behavior Analytics) uses ML to establish behavioral baselines and detect anomalies indicating compromised accounts or insider threats. Critical for identity security.
Answer: True
Model registries (MLflow, SageMaker) manage model versions, parameters, metrics, and deployment history. Enables auditability, reproducibility, and rollback. Critical for enterprise MLOps.
Answer: Both A and B
ML security testing: adversarial examples test robustness, penetration testing finds implementation flaws. Critical for secure AI deployment in sensitive domains.
Answer: Multimodal Learning
Multimodal models (CLIP, LLaVA) process text, images, audio jointly, enabling visual question answering, image captioning, and cross-modal retrieval. Critical for next-gen AI applications.
Answer: True
Knowledge distillation trains compact models to mimic large teacher outputs, enabling efficient deployment on edge devices with minimal accuracy loss. Critical for scalable AI systems.
Answer: Both A and B
Code LLMs (Codex, CodeLlama) trained on code corpora enable natural language to code generation. Program synthesis automates code creation from specifications. Critical for developer productivity tools.
Answer: True
DPDP Act governs processing of digital personal data: (1) within India, and (2) outside India if offering goods/services or profiling individuals in India. Aligns with GDPR's extraterritorial scope.
Answer: TRAI
Telecom Regulatory Authority of India (TRAI) recommends policies, regulates tariffs, ensures QoS, and manages spectrum auctions. Critical for telecom sector governance questions.
Answer: Semiconductor
India Semiconductor Mission implements ₹76,000 crore incentive scheme for fabs, display fabs, ATMP, design. Partnerships with global players announced. Critical for tech sovereignty questions.
Answer: All of these
High-cardinality handling: one-hot for low cardinality, target encoding for medium, embeddings for high (deep learning). Choice depends on model type and cardinality. Critical for feature preprocessing.
Answer: True
Feature engineering: domain knowledge, transformations, interactions, encoding. Often more impactful than algorithm selection. Critical for successful machine learning projects.
Answer: ROC-AUC
ROC-AUC (Receiver Operating Characteristic - Area Under Curve) measures classifier performance across all thresholds, robust to class imbalance. Critical for evaluating binary classification models.
Answer: Ensemble
Ensemble methods (bagging, boosting, stacking) combine weak learners to reduce variance, bias, or improve predictions. Random Forests and Gradient Boosting are widely used ensemble techniques.
Answer: Multi-Site Active-Active
Active-active runs full workload in multiple regions simultaneously, enabling instant failover with zero RPO/RTO. Highest cost but maximum resilience. Critical for mission-critical systems.