Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: VSSC
VSSC (Vikram Sarabhai Space Centre), Thiruvananthapuram, is ISRO's lead center for launch vehicle development including PSLV, GSLV, and LVM3. URSC handles satellites, LPSC develops propulsion systems, ISAC integrates satellites. ISRO has multiple specialized centers across India.
Answer: Hashing
Hashing transforms input data of any size into a fixed-length hash value using algorithms like SHA-256 or MD5. It is one-way (irreversible), used for password storage, data integrity verification, and digital signatures. Unlike encryption, hashed data cannot be decrypted to original form.
Answer: 3NF
Third Normal Form (3NF) requires that a table is in 2NF and has no transitive dependencies (non-key attributes depending on other non-key attributes). This reduces redundancy and update anomalies. BCNF is a stricter version of 3NF handling certain edge cases in dependency relationships.
Answer: False
CoWIN is built on a modular, scalable architecture that can be repurposed for other immunization and health programs. The government has indicated plans to adapt CoWIN for routine vaccination drives, demonstrating the value of building flexible digital public infrastructure for healthcare delivery.
Answer: CDMA
CDMA (Code Division Multiple Access) allows multiple users to transmit simultaneously on same frequency by assigning unique spreading codes. Used in 3G networks. FDMA divides frequency, TDMA divides time slots, OFDMA (used in 4G/5G) combines frequency and time division with orthogonal subcarriers.
Answer: 4.0
Industry 4.0 (Fourth Industrial Revolution) integrates IoT, AI, cloud computing, cyber-physical systems, and real-time data analytics into manufacturing. Enables smart factories with predictive maintenance, mass customization, and autonomous decision-making. India's SAMARTH Udyog initiative promotes Industry 4.0 adoption in MSMEs.
Answer: Ctrl+C
Ctrl+C copies selected content to clipboard. Ctrl+V pastes, Ctrl+X cuts (copy+delete), Ctrl+Z undoes last action. These keyboard shortcuts improve productivity across Windows applications. Mac uses Command (⌘) key instead of Ctrl for similar functions.
Answer: False
No antivirus can guarantee 100% detection due to zero-day exploits, polymorphic malware, and advanced persistent threats. Effective security requires layered approach: updated AV, firewall, patches, user awareness, backups, and behavioral analysis. Regular updates improve detection but cannot eliminate all risks.
Answer: BBPS
BBPS (Bharat Bill Payment System) is an integrated bill payment platform by NPCI that enables customers to pay recurring bills (electricity, water, gas, DTH, telecom) through multiple channels (online, bank branches, BCs, CSCs). Offers interoperability, instant confirmation, and grievance redressal.
Answer: Intranet
Intranet is a private network using TCP/IP protocols, accessible only to organization members. It hosts internal websites, documents, and applications. Extranet extends intranet to authorized external users (partners, vendors). Internet is the public global network. Firewalls protect intranets from external threats.
Answer: RLV-TD
RLV-TD (Reusable Launch Vehicle - Technology Demonstrator) is ISRO's project to develop cost-effective access to space through reusable rocket technology. It tests hypersonic flight, autonomous landing, and powered cruise flight. Successful tests bring India closer to fully reusable launch systems.
Answer: False
Defragmentation rearranges fragmented files on HDDs to improve read/write speed. However, SSDs have no moving parts and access data electronically, so defragmentation provides no benefit and may reduce SSD lifespan due to unnecessary write cycles. Modern OS automatically disables defrag for SSDs.
Answer: Blockchain
Blockchain is a decentralized, distributed ledger technology where transactions are recorded across multiple nodes, making it tamper-resistant and transparent. Beyond cryptocurrencies, it's used in supply chain, voting, identity management, and smart contracts. Key features: immutability, consensus, cryptography.
Answer: Make
Make in India, launched in 2014, aims to transform India into a global manufacturing hub, with focus on 27 sectors including electronics, IT, and telecommunications. It encourages foreign investment, skill development, and innovation to boost domestic production and reduce imports.
Answer: SQL Injection
SQL Injection occurs when attackers insert malicious SQL statements into input fields to manipulate database queries. Can lead to data theft, deletion, or unauthorized access. Prevention: use parameterized queries, input validation, ORM frameworks, and least-privilege database accounts.
Answer: False
Database choice depends on use case. SQL (MySQL, PostgreSQL) excels at structured data, complex queries, and ACID transactions. NoSQL (MongoDB, Cassandra) is better for unstructured data, horizontal scaling, and high-velocity writes. Many systems use both (polyglot persistence) for different needs.
Answer: 1800 MHz
India's 4G LTE services primarily use 1800 MHz (Band 3) and 2300 MHz (Band 40) spectrum. 700 MHz is being rolled out for better rural coverage. 26 GHz and 60 GHz are mmWave bands considered for future 5G enhancements, not current 4G deployments.
Answer: Booting
Booting is the startup sequence when a computer is powered on. BIOS/UEFI performs POST (Power-On Self-Test), locates boot device, loads bootloader, which then loads the OS kernel into RAM. Cold boot = power-on start; warm boot = restart without power cycle.
Answer: Uniform Resource Locator
URL (Uniform Resource Locator) is the address used to access resources on the internet. It includes protocol (http/https), domain name, path, and optional parameters. Example: https://www.example.com/page?query=1. URLs are a subset of URIs (Uniform Resource Identifiers).
Answer: False
While Aadhaar is widely used for DBT and service delivery, the Supreme Court has ruled that Aadhaar cannot be made mandatory for all services. It is mandatory for PAN linkage, certain welfare schemes, and telecom verification, but alternatives must be provided for other services as per privacy judgments.