Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: False
Cache memory is FASTER than main RAM but SLOWER than CPU registers. Speed hierarchy: CPU Registers (fastest) > L1 Cache > L2 Cache > L3 Cache > RAM > SSD > HDD (slowest). Cache stores frequently accessed data to reduce CPU wait time and improve system performance.
Answer: Generative Adversarial Networks
GANs (Generative Adversarial Networks) consist of two neural networks - a generator that creates fake data and a discriminator that evaluates authenticity. They compete to improve output quality. Used in deepfakes, art generation, drug discovery, and data augmentation. Ethical concerns include misinformation.
Answer: 1,00,000
As of 2026, the standard UPI transaction limit is ₹1 lakh per transaction for most categories. Some categories like capital market, insurance, and mutual funds have higher limits (₹2-5 lakh). Limits may vary by bank and user risk profile. Always check latest RBI notifications for updates.
Answer: True
IPv6 uses 128-bit addresses (e.g., 2001:0db8:85a3::8a2e:0370:7334) providing approximately 3.4×10^38 unique addresses, solving IPv4 exhaustion. IPv4 uses 32-bit addresses (e.g., 192.168.1.1) allowing ~4.3 billion addresses. IPv6 also offers improved security and auto-configuration.
Answer: HAVING
HAVING clause filters results after GROUP BY aggregation, while WHERE filters rows before grouping. Example: SELECT dept, AVG(salary) FROM emp GROUP BY dept HAVING AVG(salary) > 50000. WHERE cannot be used with aggregate functions directly.
Answer: Zero
Zero Trust is a cybersecurity framework that requires strict identity verification for every person and device accessing resources on a private network, regardless of location. It follows 'never trust, always verify' principle, using micro-segmentation, least-privilege access, and continuous monitoring.
Answer: NFC
NFC (Near Field Communication) enables contactless payments by allowing two devices to communicate when placed within 4 cm. Used in Google Pay, Apple Pay, and RuPay Contactless. It operates at 13.56 MHz and supports secure element storage for payment credentials.
Answer: False
Linux is a free and open-source operating system kernel created by Linus Torvalds in 1991. It is not developed by Microsoft. Linux distributions (Ubuntu, Fedora, Debian) are widely used in servers, embedded systems, and increasingly in desktops. Microsoft develops Windows, a proprietary OS.
Answer: e-Kranti
e-Kranti (National e-Governance Plan 2.0) is a pillar of Digital India focusing on electronic delivery of government services across sectors like education, health, agriculture, and justice. It emphasizes integrated services, cloud adoption, and mobile-first approach for citizen convenience.
Answer: Virtual
Virtual Reality (VR) creates simulated 3D environments that users can interact with using headsets and controllers. Unlike AR which augments reality, VR completely replaces the physical world. Applications include gaming, training simulations, virtual tours, and therapeutic uses.
Answer: True
Gaganyaan is ISRO's ambitious human spaceflight program aiming to send Indian astronauts (Gagannauts) to low Earth orbit (~400 km) for 3-7 days. The mission uses GSLV Mk III rocket and includes multiple uncrewed test flights before the crewed mission, targeted for 2025-26.
Answer: Asymmetric Encryption
Asymmetric Encryption (Public-Key Cryptography) uses two mathematically related keys: public key for encryption and private key for decryption. Examples include RSA, ECC, and Diffie-Hellman. It enables secure key exchange and digital signatures, unlike symmetric encryption which uses a single shared key.
Answer: All of these
Modern crypto regulation focuses on economic substance: payment tokens, security tokens, utility tokens regulated by function. Avoids technology lock-in and adapts to innovation. Critical for policy design.
Answer: True
CBDC design can include holding limits, tiered remuneration, and intermediation models to preserve bank deposit role. Critical for financial stability while enabling digital payment innovation.
Answer: FIU-IND
Financial Intelligence Unit-India (FIU-IND) receives, analyzes, and disseminates financial intelligence including crypto transactions. VASPs must register and report suspicious activities under PMLA.
Answer: mBridge / Multi-CBDC
Multi-CBDC platforms (mBridge, Project Dunbar) test cross-border settlements using interoperable digital currencies. Aims to reduce cost, time, and intermediaries in international payments.
Answer: All of these
Carbon credit integrity: additionality proves reductions beyond business-as-usual; robust baselines define counterfactual; independent verification ensures accuracy. Critical for market credibility.
Answer: Smart / V2G
Smart charging: AI optimizes EV charging timing based on grid load, renewable availability, electricity prices. V2G enables bidirectional flow for grid services. Critical for sustainable mobility integration.
Answer: Both A and B
Carbon-aware computing: schedule batch jobs when grid renewable fraction is highest, use geographic load balancing to low-carbon regions. Critical for sustainable cloud operations.
Answer: True
Credible voluntary markets: independent verification of emission reductions, adherence to standards (Verra, Gold Standard), transparent registries. Critical for corporate ESG credibility and climate finance.