Create a custom practice set
Pick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizPick category, difficulty, number of questions, and time limit. Start instantly with your own quiz.
Generate QuizNo weekly quiz is published yet. Check the weekly page for the latest updates.
View Weekly PageFilter by category, type, and difficulty. Reading is open for everyone.
Answer: True
Fine-tuning updates pre-trained model weights on task-specific data, enabling adaptation to domains like healthcare, legal, or customer service with limited labeled examples. Critical for practical LLM deployment.
Answer: Transformer
Transformer architecture (Vaswani et al., 2017) uses self-attention mechanisms to process sequences in parallel, enabling scaling to billions of parameters. Foundation for GPT, BERT, LLaMA, and other LLMs. Critical for understanding modern AI systems.
Answer: Compiling Source Code
Compiling source code is performed by compiler software (like GCC, javac), not the OS. OS functions include: process management, memory management, file system management, device management, security, and user interface. Compilers are application/system software that run ON the OS.
Answer: QR
QR (Quick Response) Code is a two-dimensional barcode that stores payment information. UPI apps can scan merchant QR codes to initiate payments instantly without entering account details. NPCI's Bharat QR is interoperable across banks and payment apps, promoting cashless transactions at small merchants.
Answer: Computer Vision
Computer Vision enables machines to interpret and understand visual information from the world using cameras and AI algorithms. Applications include facial recognition, medical imaging analysis, autonomous vehicles, quality inspection, and augmented reality. Combines deep learning, image processing, and pattern recognition.
Answer: False
Internet is the global network of interconnected computers using TCP/IP protocols. WWW (World Wide Web) is a service that runs on the internet, using HTTP/HTTPS to access interlinked hypertext documents. Other internet services include email, FTP, VoIP. Web is a subset of internet.
Answer: VSSC
VSSC (Vikram Sarabhai Space Centre), Thiruvananthapuram, is ISRO's lead center for launch vehicle development including PSLV, GSLV, and LVM3. URSC handles satellites, LPSC develops propulsion systems, ISAC integrates satellites. ISRO has multiple specialized centers across India.
Answer: Hashing
Hashing transforms input data of any size into a fixed-length hash value using algorithms like SHA-256 or MD5. It is one-way (irreversible), used for password storage, data integrity verification, and digital signatures. Unlike encryption, hashed data cannot be decrypted to original form.
Answer: 3NF
Third Normal Form (3NF) requires that a table is in 2NF and has no transitive dependencies (non-key attributes depending on other non-key attributes). This reduces redundancy and update anomalies. BCNF is a stricter version of 3NF handling certain edge cases in dependency relationships.
Answer: False
CoWIN is built on a modular, scalable architecture that can be repurposed for other immunization and health programs. The government has indicated plans to adapt CoWIN for routine vaccination drives, demonstrating the value of building flexible digital public infrastructure for healthcare delivery.
Answer: CDMA
CDMA (Code Division Multiple Access) allows multiple users to transmit simultaneously on same frequency by assigning unique spreading codes. Used in 3G networks. FDMA divides frequency, TDMA divides time slots, OFDMA (used in 4G/5G) combines frequency and time division with orthogonal subcarriers.
Answer: 4.0
Industry 4.0 (Fourth Industrial Revolution) integrates IoT, AI, cloud computing, cyber-physical systems, and real-time data analytics into manufacturing. Enables smart factories with predictive maintenance, mass customization, and autonomous decision-making. India's SAMARTH Udyog initiative promotes Industry 4.0 adoption in MSMEs.
Answer: Ctrl+C
Ctrl+C copies selected content to clipboard. Ctrl+V pastes, Ctrl+X cuts (copy+delete), Ctrl+Z undoes last action. These keyboard shortcuts improve productivity across Windows applications. Mac uses Command (⌘) key instead of Ctrl for similar functions.
Answer: False
No antivirus can guarantee 100% detection due to zero-day exploits, polymorphic malware, and advanced persistent threats. Effective security requires layered approach: updated AV, firewall, patches, user awareness, backups, and behavioral analysis. Regular updates improve detection but cannot eliminate all risks.
Answer: BBPS
BBPS (Bharat Bill Payment System) is an integrated bill payment platform by NPCI that enables customers to pay recurring bills (electricity, water, gas, DTH, telecom) through multiple channels (online, bank branches, BCs, CSCs). Offers interoperability, instant confirmation, and grievance redressal.
Answer: Intranet
Intranet is a private network using TCP/IP protocols, accessible only to organization members. It hosts internal websites, documents, and applications. Extranet extends intranet to authorized external users (partners, vendors). Internet is the public global network. Firewalls protect intranets from external threats.
Answer: RLV-TD
RLV-TD (Reusable Launch Vehicle - Technology Demonstrator) is ISRO's project to develop cost-effective access to space through reusable rocket technology. It tests hypersonic flight, autonomous landing, and powered cruise flight. Successful tests bring India closer to fully reusable launch systems.
Answer: False
Defragmentation rearranges fragmented files on HDDs to improve read/write speed. However, SSDs have no moving parts and access data electronically, so defragmentation provides no benefit and may reduce SSD lifespan due to unnecessary write cycles. Modern OS automatically disables defrag for SSDs.
Answer: Blockchain
Blockchain is a decentralized, distributed ledger technology where transactions are recorded across multiple nodes, making it tamper-resistant and transparent. Beyond cryptocurrencies, it's used in supply chain, voting, identity management, and smart contracts. Key features: immutability, consensus, cryptography.
Answer: Make
Make in India, launched in 2014, aims to transform India into a global manufacturing hub, with focus on 27 sectors including electronics, IT, and telecommunications. It encourages foreign investment, skill development, and innovation to boost domestic production and reduce imports.