Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
PLI for IT hardware (2021) provides incentives on incremental sales of laptops, tablets, servers manufactured in India. Aims to reduce imports, create jobs, strengthen electronics ecosystem.
Answer: True
Data leakage: using future data, target information, or test set in training/preprocessing. Causes overfitting and poor generalization. Critical to prevent via proper data splitting and pipeline design.
Answer: True
Multi-region architecture distributes workload across geographic regions, enabling failover during regional disasters. Critical for business continuity and global user experience.
Answer: True
GitOps (ArgoCD, Flux) declaratively defines desired state in Git; operators sync cluster state. Benefits: audit trail, rollback via git revert, peer review via PRs. Critical for cloud-native MLOps.
Answer: True
Self-supervised learning (BERT, GPT pre-training) creates supervisory signals from data structure: mask prediction, next sentence prediction. Enables learning from vast unlabeled corpora.
Answer: True
NEP 2020 emphasizes computational thinking, coding, AI exposure from Class 6 onwards, with experiential learning and teacher training. Implemented via DIKSHA, CBSE updates, ATLs.
Answer: True
Cross-validation (k-fold) trains/evaluates on multiple data splits, reducing variance in performance estimates. Critical for small datasets and reliable model selection.
Answer: True
IaC scanners (Checkov, tfsec) analyze Terraform/CloudFormation for misconfigurations: public storage, weak IAM, unencrypted resources. Critical for shift-left security in DevOps.
Answer: True
Model registries (MLflow, SageMaker) manage model versions, parameters, metrics, and deployment history. Enables auditability, reproducibility, and rollback. Critical for enterprise MLOps.
Answer: True
Knowledge distillation trains compact models to mimic large teacher outputs, enabling efficient deployment on edge devices with minimal accuracy loss. Critical for scalable AI systems.
Answer: True
DPDP Act governs processing of digital personal data: (1) within India, and (2) outside India if offering goods/services or profiling individuals in India. Aligns with GDPR's extraterritorial scope.
Answer: True
Feature engineering: domain knowledge, transformations, interactions, encoding. Often more impactful than algorithm selection. Critical for successful machine learning projects.
Answer: True
Service mesh (Istio, Linkerd) deploys sidecar proxies for mTLS, retries, metrics, tracing. Decouples infrastructure concerns from application code. Critical for cloud-native architectures.
Answer: True
Canary deployment minimizes risk by gradually expanding model exposure, monitoring metrics, and rolling back if issues arise. Critical for safe ML system updates in production.
Answer: True
LoRA adds low-rank matrices to weight updates, reducing trainable parameters by 100-1000x vs full fine-tuning. Enables efficient adaptation of LLMs on consumer hardware. Critical for resource-constrained AI.
Answer: True
Data localization (RBI payment data, DPDP Act provisions) ensures law enforcement access, reduces foreign surveillance risks. Balances sovereignty with global data flow needs. Critical for policy questions.
Answer: True
XAI methods (SHAP, LIME, attention visualization) provide interpretable explanations for AI decisions. Critical for regulated sectors (finance, healthcare) and user acceptance.
Answer: True
Serverless (Lambda, Cloud Functions) uses pay-per-execution pricing, auto-scaling from zero. Trade-offs: cold starts, execution limits, vendor lock-in. Critical for cost-optimized cloud architectures.
Answer: True
Deception deploys fake assets (servers, credentials) to lure attackers, enabling early detection and threat intelligence. Critical for proactive defense against advanced adversaries.
Answer: True
Feature stores (Feast, Tecton) manage feature engineering, versioning, and serving, preventing training-serving skew. Critical for reliable ML system performance in production.