Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Horizontal
Horizontal scaling adds more instances of stateless services to handle increased load. Contrasts with vertical scaling (upgrading instance size).
Answer: Semiconductor
India Semiconductor Mission implements ₹76,000 crore incentive scheme for semiconductor fabs, display fabs, ATMP, design ecosystem.
Answer: Tinkering
Atal Tinkering Labs provide makerspaces with tools for students to innovate. Fosters creativity, problem-solving, entrepreneurship from school level.
Answer: ASVS / Application Security Verification Standard
OWASP ASVS provides security requirements and testing guidelines for web applications. Critical for secure software development lifecycle.
Answer: All of these
DeFi risks: smart contract bugs enable fund theft, oracle manipulation feeds false prices, impermanent loss affects liquidity providers. Critical for DeFi security understanding.
Answer: Lower Energy Consumption
Neuromorphic chips achieve orders-of-magnitude better energy efficiency by mimicking brain's event-driven, sparse computation. Critical for edge AI and sustainable computing.
Answer: Quantum
Quantum annealing uses quantum tunneling to find global minima in optimization landscapes. Suitable for logistics, finance, machine learning. Different from gate-based quantum computing.
Answer: Tokenization
Tokenization replaces sensitive values with format-preserving tokens, reversible via secure vault. Used in payments, healthcare for PCI-DSS compliance.
Answer: True
Right to Erasure (Right to be Forgotten) allows individuals to request deletion when data no longer necessary or consent withdrawn. Critical for privacy compliance.
Answer: Inversion
Model inversion exploits model outputs to infer sensitive training data attributes. Critical privacy risk for ML systems handling personal data.
Answer: True
Data poisoning injects malicious samples into training data to cause targeted misclassifications or backdoors. Mitigation: data validation, robust training, anomaly detection.
Answer: Both A and B
Adversarial training includes adversarial examples in training data; defensive distillation smooths model outputs. Both improve robustness against adversarial attacks.
Answer: Canary
Canary Release deploys new version to small user subset, monitors metrics, gradually expands if stable. Reduces risk vs big-bang releases.
Answer: SPADEX
SPADEX (Space Docking Experiment) successfully demonstrated autonomous rendezvous and docking of two spacecraft in Earth orbit.
Answer: T-Hub
T-Hub (Telangana) is India's largest innovation campus, connecting startups with corporates, investors, mentors. Supports deep tech, healthtech, enterprise solutions.
Answer: Uniswap
Uniswap uses automated market maker (AMM) model with liquidity pools instead of order books. Enables permissionless token trading with constant product formula.
Answer: All of these
Renewable integration combines SCADA for control, IoT sensors for real-time data, AI forecasting for generation prediction. Critical for grid stability with high renewable penetration.
Answer: Shukrayaan-1
Shukrayaan-1 is India's planned Venus orbiter mission (target launch ~2028) to study the planet's thick atmosphere, surface processes, and solar wind interactions.
Answer: Ka
Ka-band (26.5-40 GHz) offers high bandwidth for satellite broadband but susceptible to rain attenuation. Requires adaptive coding and ground station diversity.
Answer: Neuromorphic Computing
Neuromorphic chips (Intel Loihi, IBM TrueNorth) use spiking neural networks and event-driven processing for orders-of-magnitude better energy efficiency than GPUs for AI tasks.