Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
Prompt injection exploits LLM instruction-following to bypass safety guards, extract training data, or execute unauthorized actions. Critical vulnerability for LLM applications requiring robust input sanitization.
Answer: True
Digital diplomacy: cyber norms, data governance, tech partnerships, capacity building. India actively engages in UN, GPAI, OECD on AI ethics, cybersecurity, digital trade. Critical for foreign policy questions.
Answer: True
Responsible data science: fairness audits for bias, privacy-preserving techniques, impact assessments. Critical for ethical AI deployment and regulatory compliance (DPDP Act).
Answer: True
IaC (Terraform, CloudFormation) defines infrastructure in declarative code, enabling version control, peer review, automated testing, and consistent deployments. Critical for cloud governance.
Answer: True
SOAR (Security Orchestration, Automation, and Response) automates playbooks: alert triage, enrichment, containment actions. Reduces analyst workload and response time. Critical for SOC efficiency.
Answer: True
Threat intelligence (commercial, open-source, ISACs) provides IOCs: malicious IPs, domains, hashes, TTPs. Enables proactive blocking and hunting. Critical for mature security operations.
Answer: True
Quantization (INT8, INT4) reduces model size 2-4x with minimal accuracy loss, enabling deployment on edge devices and reducing cloud inference costs. Critical for scalable LLM serving.
Answer: True
PEFT methods (LoRA, Adapter, Prefix-tuning) update small subset of parameters or add lightweight modules, reducing compute/memory vs full fine-tuning. Critical for resource-constrained LLM adaptation.
Answer: True
Fine-tuning updates pre-trained model weights on task-specific data, enabling adaptation to domains like healthcare, legal, or customer service with limited labeled examples. Critical for practical LLM deployment.
Answer: False
Internet is the global network of interconnected computers using TCP/IP protocols. WWW (World Wide Web) is a service that runs on the internet, using HTTP/HTTPS to access interlinked hypertext documents. Other internet services include email, FTP, VoIP. Web is a subset of internet.
Answer: False
CoWIN is built on a modular, scalable architecture that can be repurposed for other immunization and health programs. The government has indicated plans to adapt CoWIN for routine vaccination drives, demonstrating the value of building flexible digital public infrastructure for healthcare delivery.
Answer: False
No antivirus can guarantee 100% detection due to zero-day exploits, polymorphic malware, and advanced persistent threats. Effective security requires layered approach: updated AV, firewall, patches, user awareness, backups, and behavioral analysis. Regular updates improve detection but cannot eliminate all risks.
Answer: False
Defragmentation rearranges fragmented files on HDDs to improve read/write speed. However, SSDs have no moving parts and access data electronically, so defragmentation provides no benefit and may reduce SSD lifespan due to unnecessary write cycles. Modern OS automatically disables defrag for SSDs.
Answer: False
Database choice depends on use case. SQL (MySQL, PostgreSQL) excels at structured data, complex queries, and ACID transactions. NoSQL (MongoDB, Cassandra) is better for unstructured data, horizontal scaling, and high-velocity writes. Many systems use both (polyglot persistence) for different needs.
Answer: False
While Aadhaar is widely used for DBT and service delivery, the Supreme Court has ruled that Aadhaar cannot be made mandatory for all services. It is mandatory for PAN linkage, certain welfare schemes, and telecom verification, but alternatives must be provided for other services as per privacy judgments.
Answer: True
A byte is a unit of digital information that most commonly consists of 8 bits. This standard allows representation of 256 values (0-255), sufficient for ASCII characters. Larger units: Kilobyte (1024 bytes), Megabyte (1024 KB), etc. Some historical systems used different byte sizes, but 8-bit byte is now universal.
Answer: True
Edge computing brings computation and data storage closer to IoT devices and data sources, reducing latency, bandwidth usage, and improving real-time processing. Critical for autonomous vehicles, industrial IoT, and smart cities where milliseconds matter. Complements, not replaces, cloud computing.
Answer: True
VoLTE (Voice over LTE) allows voice calls to be transmitted as data packets over 4G networks, enabling faster call setup, HD voice quality, and simultaneous voice+data usage. Unlike traditional calls that drop to 2G/3G, VoLTE maintains 4G connectivity throughout the call.
Answer: False
Cache memory is FASTER than main RAM but SLOWER than CPU registers. Speed hierarchy: CPU Registers (fastest) > L1 Cache > L2 Cache > L3 Cache > RAM > SSD > HDD (slowest). Cache stores frequently accessed data to reduce CPU wait time and improve system performance.
Answer: True
IPv6 uses 128-bit addresses (e.g., 2001:0db8:85a3::8a2e:0370:7334) providing approximately 3.4×10^38 unique addresses, solving IPv4 exhaustion. IPv4 uses 32-bit addresses (e.g., 192.168.1.1) allowing ~4.3 billion addresses. IPv6 also offers improved security and auto-configuration.