Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: False
Serverless (e.g., AWS Lambda, Azure Functions) abstracts server management from developers. Servers still exist but are fully managed by the provider. Developers deploy code functions that auto-scale and charge per execution. Benefits: no infrastructure management, automatic scaling, pay-per-use pricing. Not 'no servers' but 'no server management'.
Answer: False
SMS-based OTP is vulnerable to SIM swapping, SS7 attacks, and phishing. More secure MFA methods include: authenticator apps (TOTP), hardware tokens (YubiKey), biometrics, and FIDO2/WebAuthn. NIST guidelines recommend moving away from SMS OTP for high-security applications. Layered security approach is essential.
Answer: True
Homomorphic encryption enables performing calculations on ciphertext, producing encrypted results that, when decrypted, match operations performed on plaintext. Critical for privacy-preserving cloud computing, secure voting, and confidential AI inference. Still computationally intensive but advancing with research and hardware acceleration.
Answer: True
Clustered index physically sorts table data rows based on index key values. Since data can be sorted in only one order, a table can have only one clustered index (usually on primary key). Non-clustered indexes store logical order separately with pointers to data rows; multiple non-clustered indexes are allowed.
Answer: True
Aditya-L1 orbits the Sun-Earth L1 Lagrange point (~1.5 million km from Earth), where gravitational forces balance, allowing uninterrupted solar observation. This position avoids Earth's shadow, enabling 24/7 monitoring of solar activities, coronal mass ejections, and space weather forecasting.
Answer: False
The shared responsibility model states: Cloud provider is responsible for security 'OF' the cloud (infrastructure, hardware, physical security). Customer is responsible for security 'IN' the cloud (data, applications, access management, OS patching in IaaS). Responsibilities vary by service model (IaaS/PaaS/SaaS).
Answer: True
Offline mode enables transactions without internet, synchronizing when online.
Answer: True
Carbon credits traded in compliance and voluntary markets.
Answer: True
Artemis Accords signed by India in 2023 for cooperative exploration.
Answer: True
SPHINCS+ uses hash functions believed quantum-resistant. Trade-off: larger signatures.
Answer: True
Purpose limitation prevents function creep and ensures consented use.
Answer: True
Service mesh deploys sidecar proxies for mTLS, retries, metrics, tracing.
Answer: True
Cyber sovereignty drives policies: data localization, domestic infrastructure, indigenous standards.
Answer: True
Programmable CBDC enables conditional transfers for specific goods/services.
Answer: True
ISRU extracts and processes lunar materials for propellant production, enabling sustainable exploration.
Answer: True
Quantum annealing specializes in optimization via quantum tunneling. Different from gate-based universal quantum computing.
Answer: True
Right to Correction ensures data accuracy and enables individuals to update incorrect information.
Answer: True
Startup India ecosystem integrates Hub, DPIIT recognition, NITI Aayog policy guidance.
Answer: True
Data sovereignty drives policies: data localization, domestic cloud infrastructure, indigenous standards.
Answer: True
Offline CBDC uses secure hardware for local transaction storage, synchronizing when online.