Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: False
Chandrayaan-2's lander Vikram lost communication during final descent and crash-landed on the Moon in September 2019. However, the orbiter component was successfully placed in lunar orbit and continues to provide valuable scientific data.
Answer: Firewall
Firewall is a network security device/software that monitors and filters traffic between trusted internal networks and untrusted external networks based on security rules. It can be hardware-based, software-based, or cloud-based.
Answer: Register
Registers are the fastest memory type, located inside the CPU, used for immediate data processing. Cache is next fastest (L1/L2/L3), followed by RAM, then storage devices (SSD/HDD). Speed hierarchy: Registers > Cache > RAM > SSD > HDD.
Answer: True
RuPay is India's indigenous card payment scheme developed by NPCI. It offers lower transaction costs, promotes financial inclusion, and is accepted at millions of ATMs and PoS terminals across India. RuPay cards are issued by most Indian banks.
Answer: IoT
IoT (Internet of Things) refers to network of physical devices embedded with sensors, software, and connectivity to collect and exchange data. Applications include smart homes, industrial automation, healthcare monitoring, and smart cities.
Answer: IP
IP (Internet Protocol) Address is a numerical label assigned to each device connected to a network. IPv4 uses 32-bit addresses (e.g., 192.168.1.1), while IPv6 uses 128-bit addresses to accommodate the growing number of internet-connected devices.
Answer: Stack
Stack is a linear data structure that follows LIFO principle - the last element added is the first to be removed. Operations include push (add) and pop (remove). Used in function call management, expression evaluation, and undo mechanisms.
Answer: False
Using the same password across multiple accounts is highly risky. If one account is breached, attackers can access all accounts with the same credentials. Best practice: use unique, strong passwords for each account and enable two-factor authentication.
Answer: CPU
CPU (Central Processing Unit) is the primary component that executes program instructions, performs calculations, and controls other computer parts. Modern CPUs contain multiple cores for parallel processing and cache memory for faster data access.
Answer: BharatNet
BharatNet (formerly National Optical Fibre Network) aims to connect all 2.5 lakh gram panchayats with high-speed optical fiber. It is one of the world's largest rural connectivity projects, enabling delivery of e-governance, education, and healthcare services.
Answer: False
Blockchain has diverse applications beyond cryptocurrency: supply chain tracking, digital identity, voting systems, healthcare records, land registries, and smart contracts. Its core value is providing decentralized, tamper-proof, transparent record-keeping.
Answer: NavIC
NavIC (Navigation with Indian Constellation), formerly IRNSS, is India's independent regional satellite navigation system providing accurate position information over India and 1500 km around. It consists of 7 satellites and is an alternative to GPS.
Answer: 2G
2G (specifically GPRS/EDGE enhancements) introduced packet-switched data transmission, enabling always-on internet access and efficient data usage. 1G was analog voice only; 3G improved data speeds; 4G introduced all-IP architecture with higher bandwidth.
Answer: False
Operating System (like Windows, Linux, Android) is system software that manages hardware resources and provides services for application software. Application software (like MS Word, Chrome) runs on top of the OS to perform user-specific tasks.
Answer: Hyper Text Transfer Protocol Secure
HTTPS indicates that communication between browser and website is encrypted using SSL/TLS protocols. This protects data from eavesdropping and tampering. Users should look for the padlock icon and 'https://' when entering sensitive information online.
Answer: DigiLocker
DigiLocker is a cloud-based platform under Digital India that enables citizens to store, share, and verify important documents digitally. Documents issued by registered authorities through DigiLocker have legal validity under the Information Technology Act, 2000.
Answer: Quantum Computing
Quantum Computing uses qubits that can exist in superposition (0 and 1 simultaneously) and entanglement (correlated states) to solve certain problems exponentially faster than classical computers, with applications in cryptography, drug discovery, and optimization.
Answer: False
Wi-Fi is a wireless technology that allows devices to connect to a local network without cables. Internet is the global network of networks. Wi-Fi provides local wireless access; you still need an ISP connection to access the internet via Wi-Fi.
Answer: NPCI
NPCI (National Payments Corporation of India) developed the Unified Payments Interface (UPI). NPCI also operates other payment systems like IMPS, RuPay, Aadhaar Enabled Payment System (AePS), and Bharat Bill Payment System (BBPS).
Answer: Scanner
Scanner is an input device that captures images, text, or objects and converts them into digital format. Monitor, printer, and speaker are output devices that display or present processed information to the user.