Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: SQL Injection
SQL Injection occurs when attackers insert malicious SQL statements into input fields to manipulate database queries. Can lead to data theft, deletion, or unauthorized access. Prevention: use parameterized queries, input validation, ORM frameworks, and least-privilege database accounts.
Answer: False
Database choice depends on use case. SQL (MySQL, PostgreSQL) excels at structured data, complex queries, and ACID transactions. NoSQL (MongoDB, Cassandra) is better for unstructured data, horizontal scaling, and high-velocity writes. Many systems use both (polyglot persistence) for different needs.
Answer: 1800 MHz
India's 4G LTE services primarily use 1800 MHz (Band 3) and 2300 MHz (Band 40) spectrum. 700 MHz is being rolled out for better rural coverage. 26 GHz and 60 GHz are mmWave bands considered for future 5G enhancements, not current 4G deployments.
Answer: Booting
Booting is the startup sequence when a computer is powered on. BIOS/UEFI performs POST (Power-On Self-Test), locates boot device, loads bootloader, which then loads the OS kernel into RAM. Cold boot = power-on start; warm boot = restart without power cycle.
Answer: Uniform Resource Locator
URL (Uniform Resource Locator) is the address used to access resources on the internet. It includes protocol (http/https), domain name, path, and optional parameters. Example: https://www.example.com/page?query=1. URLs are a subset of URIs (Uniform Resource Identifiers).
Answer: False
While Aadhaar is widely used for DBT and service delivery, the Supreme Court has ruled that Aadhaar cannot be made mandatory for all services. It is mandatory for PAN linkage, certain welfare schemes, and telecom verification, but alternatives must be provided for other services as per privacy judgments.
Answer: Using 12+ characters with mix of types
Strong passwords should be at least 12 characters long with uppercase, lowercase, numbers, and special symbols. Avoid personal info, dictionary words, or patterns. Use unique passwords per account and store them in a password manager. Enable two-factor authentication for critical accounts.
Answer: Natural Language
Natural Language Processing (NLP) combines linguistics, computer science, and AI to enable machines to understand, interpret, and generate human language. Applications include chatbots, translation services, sentiment analysis, voice assistants, and automated content summarization.
Answer: GSLV Mk III
GSLV Mk III (now called LVM3) is ISRO's heavy-lift launch vehicle capable of placing 4-ton class satellites into GTO. It was used for Chandrayaan-2, Chandrayaan-3, and OneWeb satellite launches. PSLV handles lighter polar orbits; SSLV is for small satellites; ASLV was retired.
Answer: True
A byte is a unit of digital information that most commonly consists of 8 bits. This standard allows representation of 256 values (0-255), sufficient for ASCII characters. Larger units: Kilobyte (1024 bytes), Megabyte (1024 KB), etc. Some historical systems used different byte sizes, but 8-bit byte is now universal.
Answer: IMPS
IMPS (Immediate Payment Service) enables instant interbank electronic fund transfer 24x7 using mobile number + MMID (Mobile Money Identifier) or account number + IFSC. Developed by NPCI, it supports transfers up to ₹5 lakh. NEFT/RTGS have timing restrictions; ECS is for bulk/recurring payments.
Answer: do-while
do-while loop checks the condition AFTER executing the loop body, guaranteeing at least one execution. In contrast, while and for loops check condition BEFORE execution, potentially skipping the body entirely if condition is initially false. Syntax varies by language but logic remains consistent.
Answer: Fingerprint
Authentication factors: 1) Something you know (password/PIN), 2) Something you have (smart card/token), 3) Something you are (biometrics like fingerprint, iris, face). Multi-factor authentication combines two or more factors for enhanced security. Fingerprint is a biometric ('something you are') factor.
Answer: True
Edge computing brings computation and data storage closer to IoT devices and data sources, reducing latency, bandwidth usage, and improving real-time processing. Critical for autonomous vehicles, industrial IoT, and smart cities where milliseconds matter. Complements, not replaces, cloud computing.
Answer: SMTP
SMTP (Simple Mail Transfer Protocol) is used for sending emails from client to server or between mail servers. POP3 and IMAP are used for retrieving emails from server to client. SMTP typically uses port 25 (or 587 for secure submission).
Answer: .exe
.exe (executable) files contain programs that can be run directly by the Windows operating system. Users should be cautious opening .exe files from untrusted sources as they can contain malware. Other extensions: .txt (text), .pdf (document), .jpg (image) are data files, not executables.
Answer: True
VoLTE (Voice over LTE) allows voice calls to be transmitted as data packets over 4G networks, enabling faster call setup, HD voice quality, and simultaneous voice+data usage. Unlike traditional calls that drop to 2G/3G, VoLTE maintains 4G connectivity throughout the call.
Answer: MyGov
MyGov is a citizen engagement platform launched under Digital India that allows Indians to participate in policy discussions, submit ideas, vote on proposals, and provide feedback on government initiatives. It fosters collaborative governance and transparent decision-making.
Answer: Man
Man-in-the-Middle (MitM) attack occurs when attackers secretly relay and possibly alter communication between two parties who believe they are directly communicating. Prevention includes using HTTPS, VPNs, certificate pinning, and avoiding public Wi-Fi for sensitive transactions.
Answer: CARTOSAT
CARTOSAT series satellites are dedicated to Earth observation and remote sensing with high-resolution cameras for cartography, urban planning, and resource monitoring. INSAT is for communication/weather, GSAT for communication, and IRNSS/NavIC for navigation.