Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Shor's
Shor's Algorithm factors integers in polynomial time on quantum computers, breaking RSA which relies on factoring difficulty. Requires fault-tolerant quantum computers not yet available. Critical for post-quantum cryptography planning.
Answer: AI Act
EU AI Act (2024) mandates Fundamental Rights Impact Assessments for high-risk AI: hiring, credit scoring, law enforcement. India monitors global developments for domestic policy alignment.
Answer: True
#AIforAll (NITI Aayog) focuses on leveraging AI for social empowerment: AI for farmers, teachers, doctors. Balances innovation with ethics, inclusion, and national interest. Critical for AI policy questions.
Answer: All of these
Privacy-preserving AI: Differential Privacy adds noise to aggregates; Federated Learning trains on-device; Synthetic Data generates artificial datasets. All enable AI while protecting individual privacy.
Answer: Auditing / Assessment
AI Auditing involves systematic evaluation of models for fairness, accuracy, robustness, and compliance. Tools include bias detection frameworks, performance metrics, and third-party assessments. Critical for responsible AI deployment.
Answer: Both A and B
India endorses OECD AI Principles (2019) and UNESCO Recommendation on AI Ethics (2021). Both emphasize human rights, transparency, accountability, and sustainability. Critical for AI governance questions.
Answer: True
DPDP Act mandates transparency in automated decisions: individuals have right to explanation for decisions affecting rights, benefits, or obligations. Aligns with global standards like GDPR Article 22.
Answer: All of these
Explainable AI (XAI) techniques: Feature Importance ranks input influence; LIME/SHAP provide local explanations; Model Cards document model purpose, performance, limitations. Critical for trust and regulatory compliance.
Answer: in-the-loop
Human-in-the-loop (HITL) ensures human oversight of AI decisions, especially in high-stakes domains. Critical for accountability, error correction, and ethical compliance. Complements human-on-the-loop supervision.
Answer: True
Algorithmic accountability mandates transparency in AI: documenting data sources, model design, testing, and decision logic. Enables auditing, bias detection, and redressal. Supported by DPDP Act and sectoral guidelines.
Answer: Fairness
Fairness in AI requires systems to avoid bias based on race, gender, caste, religion, etc. Techniques include bias detection metrics, diverse training data, and fairness-aware algorithms. Critical for ethical AI deployment in hiring, lending, and public services.
Answer: Right to Erasure
Right to Erasure (Right to be Forgotten) allows individuals to request deletion of personal data when no longer necessary or consent withdrawn. Critical for DPDP/GDPR compliance questions.
Answer: True
CSPM automates detection/remediation of cloud misconfigurations: public storage, weak IAM, unencrypted data. Critical for preventing cloud breaches.
Answer: Both A and B
NIST IR 8259 and ETSI EN 303 645 provide IoT security baselines: secure boot, updates, data protection. Critical for IoT security architecture questions.
Answer: Forum / Index
ITU Global Cybersecurity Index assesses national cybersecurity commitment; forums facilitate knowledge sharing. India ranks high in GCI. Critical for international cybersecurity questions.
Answer: All of these
Cloud AI certifications validate skills in model development, deployment, MLOps. Critical for AI/ML roles in growing Indian tech sector.
Answer: True
Strangler Fig incrementally replaces monolith features with microservices behind API gateway. Reduces risk vs big-bang rewrite. Critical for legacy modernization questions.
Answer: All of these
Constraints enforce rules; triggers automate actions; DQ rules validate/clean data. Combined for data integrity. Critical for reliable analytics and compliance.
Answer: SSH
SSH (Secure Shell) encrypts remote command execution and file transfer, replacing insecure Telnet. Critical for secure network administration.
Answer: Both A and B
iDEX (Defence) and IN-SPACe (Space) provide funding, mentorship, and market access for startups in strategic domains. Critical for defense/space innovation questions.