Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
PEFT methods update small subset of parameters, reducing compute/memory.
Answer: True
Feature engineering: domain knowledge, transformations, interactions, encoding.
Answer: True
Data lakes store raw structured/unstructured data; warehouses store curated data.
Answer: True
CDC captures database operations and streams to targets for real-time analytics.
Answer: True
IOCs are forensic artifacts indicating potential breaches. Used for proactive blocking.
Answer: True
Micro-segmentation creates granular security zones, containing breaches and limiting attacker movement.
Answer: True
Positional encodings add sequence order information to token embeddings, critical for language understanding tasks.
Answer: True
CEP engines detect complex patterns, correlations, and sequences in real-time streams. Critical for fraud detection, monitoring.
Answer: True
IAM systems manage user identities, authentication, authorization. Critical for implementing least privilege access controls.
Answer: True
India's rapid 5G deployment driven by competitive telecom operators, government policy support, indigenous technology development.
Answer: True
IOCs are forensic artifacts indicating potential breaches. Used for proactive blocking, hunting, and incident response.
Answer: True
Cloud Security Posture Management automates detection/remediation of misconfigurations: public storage, weak IAM, unencrypted resources.
Answer: True
Micro-segmentation creates granular security zones around workloads, containing breaches and limiting attacker movement. Critical for Zero Trust implementation.
Answer: False
INNER JOIN returns only matching rows. OUTER JOIN (LEFT/RIGHT/FULL) returns matching rows PLUS unmatched rows from one or both tables, with NULLs for missing side. LEFT JOIN: all left table rows; RIGHT JOIN: all right table rows; FULL OUTER: all rows from both. Essential for comprehensive data analysis and reporting.
Answer: False
ABHA (Ayushman Bharat Health Account) number is voluntary and consent-based. Citizens can choose to create ABHA ID for convenient access to digital health records, but cannot be denied healthcare services for not having it. Aligns with Supreme Court privacy principles and DPDP Act requirements for voluntary consent in data processing.
Answer: True
Cloud bursting allows organizations to maintain baseline capacity on-premises/private cloud and dynamically scale to public cloud during traffic spikes. Optimizes cost (pay for extra only when needed) while ensuring performance. Requires compatible infrastructure, orchestration tools, and data synchronization between environments.
Answer: True
Zero Trust operates on 'never trust, always verify' principle. It eliminates implicit trust based on network location, requiring strict identity verification for every access request regardless of origin. Implements micro-segmentation, least-privilege access, continuous monitoring, and assumes breach mindset for robust security posture.
Answer: True
PSLV has four stages: 1st and 3rd use solid propellant; 2nd and 4th use liquid propellant. Strap-on solid boosters enhance lift-off thrust. This alternating design optimizes performance for polar and sun-synchronous orbits. PSLV's reliability and versatility made it ISRO's workhorse for earth observation and small satellite launches.
Answer: False
Many modern NoSQL databases support ACID transactions, at least for single-document or single-partition operations. Examples: MongoDB (multi-document ACID since 4.0), Cassandra (lightweight transactions), Google Spanner (globally distributed ACID). Trade-offs exist between consistency, availability, and partition tolerance (CAP theorem).
Answer: True
DPDP Act 2023 has extraterritorial application: it governs processing of digital personal data (1) within India, and (2) outside India if it involves profiling or offering goods/services to individuals in India. Aligns with global frameworks like GDPR. Establishes Data Protection Board and mandates consent, purpose limitation, and data principal rights.