Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: SSD
SSD (Solid State Drive) uses flash memory chips with no moving parts, offering faster boot times, file access, and durability compared to HDDs with spinning platters. SSDs are silent, consume less power, and are resistant to physical shock. Prices have decreased, making SSDs standard in modern devices.
Answer: False
UPI uses Virtual Payment Addresses (VPAs) like name@bank, eliminating need to enter account number/IFSC repeatedly. Users can also save beneficiaries, scan QR codes, or use mobile numbers linked to UPI. This simplifies payments and reduces errors compared to traditional NEFT/IMPS transfers.
Answer: CSRF
CSRF (Cross-Site Request Forgery) tricks authenticated users into executing unwanted actions on a web application where they're logged in. Attacker exploits trust between browser and site. Prevention: anti-CSRF tokens, SameSite cookies, checking referrer headers. Distinct from XSS which injects malicious scripts.
Answer: NAT
NAT (Network Address Translation) allows multiple devices on a private network to share a single public IP address when accessing the internet. Conserves IPv4 addresses and adds a layer of security by hiding internal network structure. Implemented in routers and firewalls.
Answer: #
In Python, # denotes single-line comments. Multi-line comments use triple quotes (''' or """). Other languages: // and /* */ in C/Java/JavaScript, -- in SQL. Comments improve code readability and documentation but are ignored by compilers/interpreters during execution.
Answer: True
Smart contracts are self-executing programs stored on blockchain that automatically enforce agreements when coded conditions are satisfied. Eliminate intermediaries, reduce fraud, and increase transparency. Used in DeFi, supply chain, insurance, and voting. Code vulnerabilities require careful auditing.
Answer: NISAR
NISAR (NASA-ISRO Synthetic Aperture Radar) is a joint Earth-observation satellite using dual-frequency radar to monitor ecosystems, ice masses, vegetation, and natural hazards. Scheduled for launch in 2024, it will provide unprecedented data for climate science and disaster management globally.
Answer: SWAYAM
SWAYAM (Study Webs of Active-Learning for Young Aspiring Minds) is a MOOC platform offering free online courses from 9th grade to post-graduation by reputed Indian institutions. Credits earned can be transferred to academic records. Part of Digital India's education transformation initiatives.
Answer: VoLTE
VoLTE (Voice over LTE) transmits voice as IP packets over 4G data network, enabling simultaneous voice calls and high-speed internet without dropping to 3G/2G. Provides HD voice quality, faster call setup, and improved battery life. Requires compatible device, SIM, and network support.
Answer: True
Unicode is a universal character encoding standard supporting over 149,000 characters from 161 scripts, plus symbols, emojis, and historical scripts. Replaces legacy encodings (ASCII, ISO-8859) that supported limited languages. UTF-8 is the dominant Unicode encoding on the web and modern systems.
Answer: Digital Signature
Digital Signatures use public-key cryptography to verify message integrity (not altered) and authenticity (sender identity). Based on hashing and asymmetric encryption. Used in software distribution, financial transactions, legal documents. Distinct from digital certificates which bind public keys to identities.
Answer: Responsible
Responsible AI encompasses principles and practices to ensure AI systems are developed and deployed ethically: fairness (avoiding bias), accountability (clear responsibility), transparency (explainable decisions), privacy protection, and human oversight. India's AI strategy emphasizes Responsible AI for inclusive growth.
Answer: AePS
AePS (Aadhaar Enabled Payment System) uses Aadhaar number and biometric authentication (fingerprint/iris) for cash withdrawal, deposit, balance inquiry, and fund transfer at Micro-ATMs. Operated by NPCI, it enables banking services for citizens without cards, phones, or internet connectivity.
Answer: True
Proxy servers act as intermediaries between client and internet, masking the user's real IP address. By connecting through a proxy in another country, users can access geo-restricted content. However, many services now detect and block proxy/VPN traffic. Legal and policy considerations apply.
Answer: Windows OS
System software manages hardware and provides platform for applications. Examples: Operating Systems (Windows, Linux), device drivers, utilities, compilers. Application software performs user tasks: Word (document editing), Chrome (web browsing), VLC (media playback). OS is foundational system software.
Answer: Worm
Computer Worm is standalone malware that self-replicates to spread across networks, exploiting vulnerabilities without requiring user action (unlike viruses that need host files). Worms can consume bandwidth, install backdoors, or deliver payloads. Prevention: network segmentation, patching, firewall rules.
Answer: SPADEX
SPADEX (Space Docking Experiment) is ISRO's technology demonstrator mission to master orbital docking/undocking, critical for future space station modules, satellite servicing, and human spaceflight. Successful docking enables complex missions requiring spacecraft to connect and transfer resources in orbit.
Answer: True
As per Rule 9A of Information Technology (Preservation and Retention of Information by Intermediaries providing Digital Locker facilities) Rules, 2016, documents issued by registered authorities through DigiLocker are legally valid and equivalent to physical originals under the IT Act, 2000.
Answer: COMMIT
COMMIT permanently saves all changes made during a transaction to the database. ROLLBACK undoes uncommitted changes. Transactions follow ACID properties (Atomicity, Consistency, Isolation, Durability). Proper use of COMMIT/ROLLBACK ensures data integrity in multi-user database environments.
Answer: Machine
Machine Learning enables systems to learn patterns from data and improve performance on tasks without explicit programming. Types: Supervised (labeled data), Unsupervised (pattern discovery), Reinforcement (reward-based learning). Applications: recommendation engines, fraud detection, predictive maintenance.