Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: Subscriber Identity Module
SIM (Subscriber Identity Module) is a small chip that stores subscriber information, network authentication keys, contacts, and SMS. It identifies and authenticates users on cellular networks. eSIM is an embedded digital SIM that can be programmed remotely without physical card replacement.
Answer: True
Virtual memory is a memory management technique where the OS uses a portion of hard disk (page file/swap space) as an extension of physical RAM. Allows running programs larger than available RAM by swapping inactive pages to disk. Slower than physical RAM but enables multitasking and larger address spaces.
Answer: Phishing
Phishing is a social engineering attack where attackers impersonate legitimate entities via email/SMS to trick victims into revealing credentials or installing malware. Unlike technical exploits (buffer overflow, SQL injection), social engineering manipulates human psychology. Training and awareness are key defenses.
Answer: AePS
AePS (Aadhaar Enabled Payment System) allows bank customers to use Aadhaar number and fingerprint/iris for basic banking transactions at Micro-ATMs through Business Correspondents. Operated by NPCI, it promotes financial inclusion in rural areas without need for cards, phones, or internet.
Answer: SSH
SSH (Secure Shell) provides encrypted remote login and command execution over insecure networks. Replaces insecure Telnet which transmits data in plaintext. SSH uses public-key cryptography for authentication and supports port forwarding, file transfer (SFTP), and tunneling. Default port: 22.
Answer: False
Quantum computers threaten asymmetric algorithms like RSA and ECC using Shor's algorithm, but not all encryption. Symmetric algorithms (AES) require larger key sizes for quantum resistance. Post-Quantum Cryptography (PQC) is being standardized by NIST. Practical large-scale quantum computers capable of breaking encryption are still years away.
Answer: NavIC
NavIC (Navigation with Indian Constellation) is India's independent regional satellite navigation system with 7 satellites. Provides positioning accuracy better than 20m over India and 1500 km surrounding area. Used in transportation, disaster management, and mobile devices. GLONASS (Russia), Galileo (EU), BeiDou (China) are other global systems.
Answer: ROM
ROM (Read-Only Memory) is non-volatile memory that stores firmware like BIOS/UEFI. Data is written during manufacturing and generally cannot be modified by users. Unlike RAM which is volatile, ROM retains critical boot instructions even after power loss. Variants include PROM, EPROM, EEPROM.
Answer: PMGDISHA
PMGDISHA (Pradhan Mantri Gramin Digital Saksharta Abhiyan) aims to make 6 crore rural adults digitally literate by training them to operate computers, access internet, use digital payments, and avail e-governance services. Implemented through Common Service Centres (CSCs) across villages.
Answer: False
2FA significantly reduces risk but doesn't eliminate it. Attackers can bypass 2FA via SIM swapping, phishing for OTPs, malware capturing tokens, or social engineering. Best practice: use authenticator apps or hardware tokens instead of SMS, monitor account activity, and use unique passwords.
Answer: Smart Contracts
DeFi protocols use smart contracts to automate financial services: lending (Aave), trading (Uniswap), derivatives, and yield farming. Operate on public blockchains (Ethereum, Solana) with transparent, permissionless access. Risks include smart contract bugs, volatility, and regulatory uncertainty. Critical for fintech innovation questions.
Answer: True
4D printing uses smart materials (shape-memory polymers, hydrogels) that transform when exposed to heat, moisture, light, or magnetic fields. Applications: self-assembling structures, adaptive medical devices, and responsive textiles. Emerging research area with potential in aerospace, healthcare, and soft robotics.
Answer: LIDAR
LIDAR (Light Detection and Ranging) uses laser pulses to create high-resolution 3D maps of surroundings, enabling object detection, classification, and distance measurement. Combined with cameras, radar, and GPS for robust perception. Critical for self-driving cars, drones, and mobile robots. Important for autonomous systems questions.
Answer: Coherence
Coherence time (T1 for energy relaxation, T2 for phase decoherence) determines how many quantum operations can be performed before errors dominate. Longer coherence enables more complex algorithms. Improved via better materials, shielding, and error correction. Critical metric for comparing quantum hardware platforms.
Answer: NFT Royalties
NFT smart contracts can embed royalty clauses (e.g., 5-10%) that automatically pay creators on each resale in secondary markets. Enables sustainable creator economies in metaverse platforms. Implemented on Ethereum, Polygon, and other chains. Critical for digital ownership and creator monetization questions.
Answer: True
ZK-proofs enable one party to prove knowledge of a secret (e.g., valid transaction) without revealing the secret itself. Applications: privacy-preserving cryptocurrencies (Zcash), identity verification, and confidential smart contracts. Computationally intensive but advancing with zk-SNARKs/zk-STARKs. Critical for privacy and scalability questions.
Answer: Heat Treatment
Heat treatment (annealing, stress relieving) reduces residual stresses from rapid melting/solidification in metal AM, improving dimensional stability and mechanical properties. Other post-processing: support removal, machining, surface finishing. Critical for qualifying AM parts for aerospace/medical applications. Important for manufacturing process questions.
Answer: Closed-loop / Feedback
Closed-loop control continuously compares desired vs actual state (via sensors) and adjusts actuators to minimize error. Contrasts with open-loop (no feedback). Essential for precision tasks: assembly, welding, autonomous navigation. PID controllers are common implementation. Critical for robotics control theory questions.
Answer: Grover's Algorithm
Grover's Algorithm searches an unsorted database of N items in O(√N) queries vs O(N) classically. Applications: optimization, cryptography, and machine learning. Less dramatic than Shor's exponential speedup but broadly applicable. Requires coherent quantum operations; noise limits practical advantage on NISQ devices.
Answer: True
Persistence is a defining feature of metaverse: virtual environments, economies, and social interactions continue evolving independently of individual user presence. Enabled by cloud infrastructure, blockchain state, and server-side simulation. Critical for distinguishing metaverse from ephemeral VR experiences or video games.