Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
e-Taal (Electronic Transaction Aggregation and Analysis Layer) aggregates transaction data from government portals for monitoring and decision-making. Critical for digital governance analytics.
Answer: True
Frugal innovation (Jugaad) emphasizes simplicity, affordability, and sustainability. India's strength in healthcare, agriculture, and fintech. Critical for inclusive development questions.
Answer: True
NFV virtualizes firewalls, load balancers, routers on commodity servers. Enables agility, cost reduction, and innovation. Critical for telecom modernization questions.
Answer: True
Secrets managers (HashiCorp Vault, AWS Secrets Manager) encrypt, access-control, and auto-rotate secrets. Critical for preventing credential leaks and compliance.
Answer: True
Saga breaks transactions into local steps with compensating actions for failures. Avoids distributed locks. Critical for consistency in microservices architectures.
Answer: True
NeGP (2006) launched Mission Mode Projects: e-District, e-Panchayat, CSCs. Foundation for Digital India's service delivery transformation.
Answer: True
Digital twins combine IoT, AI, and simulation to model physical assets: factories, cities, power grids. Enables predictive maintenance and scenario testing. Critical for Industry 4.0 questions.
Answer: True
QKD leverages no-cloning theorem and measurement disturbance to detect interception. Provides information-theoretic security for key exchange. Critical for future-proof cryptography questions.
Answer: True
IaC scanners (Checkov, tfsec) analyze Terraform/CloudFormation for misconfigurations: public storage, weak IAM, unencrypted resources. Critical for shift-left security in DevOps.
Answer: True
Hexagonal Architecture defines ports (interfaces) for external services, enabling easy mocking and testing. Critical for maintainable, adaptable enterprise applications.
Answer: True
e-Hospital (under Digital India) provides HMIS for patient registration, appointments, records, billing. Improves efficiency, transparency, and patient experience in public hospitals.
Answer: True
Digital sovereignty drives policies: data localization, domestic cloud infrastructure, indigenous standards. Balances security, innovation, and global cooperation. Critical for tech policy questions.
Answer: True
TSN (IEEE 802.1) extends Ethernet for real-time control: time synchronization, traffic shaping, redundancy. Critical for Industry 4.0, autonomous vehicles, and critical infrastructure.
Answer: True
Confidential Computing (Intel SGX, AMD SEV) encrypts data in memory during processing, protecting from OS/hypervisor attacks. Critical for multi-tenant cloud and privacy-sensitive workloads.
Answer: True
API Gateway abstracts microservices complexity: request routing, authentication, rate limiting, caching, monitoring. Critical for secure, manageable microservices architectures.
Answer: True
Digital India (launched 2015) has three pillars: digital infrastructure as utility, governance & services on demand, digital empowerment of citizens. Encompasses Aadhaar, UPI, DigiLocker, BharatNet, etc.
Answer: True
Geopolitical tensions and pandemic disruptions drove policies: US CHIPS Act, EU Chips Act, India Semiconductor Mission. Aim to reduce concentration risk and ensure strategic autonomy. Critical for tech geopolitics questions.
Answer: True
IBN uses AI/ML to interpret business intent (e.g., 'prioritize VoIP'), auto-configure network, and continuously verify compliance. Reduces manual errors and operational complexity. Critical for autonomous networks questions.
Answer: True
CASBs sit between users and cloud services to enforce: access control, data loss prevention, threat protection, and compliance. Critical for securing SaaS adoption in enterprises.
Answer: True
Event Sourcing records all state changes as events, enabling reconstruction of any historical state. Supports audit, debugging, and CQRS patterns. Critical for compliant, auditable systems design.