Chapter 29: Latest Technology Trends and Practice Resources (Set-9)
In RAG pipelines, what most directly reduces hallucinations?
A B. Larger font size
B C. More GPU fans
C A. Grounded retrieval context
D D. Faster mouse clicks
RAG reduces hallucinations by retrieving relevant verified content and conditioning generation on it. The model answers using fetched context, so responses rely less on guessing from memory.
In cloud reliability, what design best limits single-region failure?
A A. Active-active regions
B B. Single AZ setup
C C. One server cluster
D D. Manual backups only
Active-active multi-region architecture serves traffic from multiple regions simultaneously. If one region fails, another continues, improving availability and lowering downtime compared to single-region setups.
Which IoT security control prevents rogue device enrollment?
A B. Plain HTTP usage
B C. Open guest Wi-Fi
C D. Shared default keys
D A. Mutual authentication
Mutual authentication verifies both device and server identity using certificates or strong credentials. This blocks unauthorized devices from joining the system and reduces spoofing-based attacks.
5G network slicing is best described as:
A B. Faster SIM swapping
B C. New antenna cables
C A. Logical isolated networks
D D. Offline base stations
Network slicing creates multiple virtual networks over a shared 5G infrastructure. Each slice can be configured for different performance and security needs like IoT, gaming, or critical services.
Smart contract risk is highest when code is:
A B. Printed and signed
B A. Unaudited and immutable
C C. Stored on USB
D D. Password protected
Smart contracts execute automatically and are difficult to change after deployment. If unreviewed code has a bug, it can be exploited permanently, causing financial or data loss.
In AR systems, “SLAM” mainly enables:
A A. Markerless environment tracking
B B. Faster printing speed
C C. Email spam filtering
D D. CPU overclocking
SLAM builds a map of the environment while tracking device position. It enables AR without markers by anchoring digital objects to real spaces with stable positioning.
A key VR performance factor to reduce motion sickness is:
A B. Larger monitor
B C. More desktop icons
C A. High frame rate
D D. Slow refresh rate
Higher frame rates and low latency reduce mismatch between movement and visuals. This improves comfort and reduces motion sickness, especially during fast motion or long VR sessions.
Edge computing is most justified when the workload needs:
A B. Long-term archiving
B A. Real-time local decisions
C C. Manual approvals
D D. Offline spreadsheets
Edge is best when decisions must happen quickly, like factory sensors or CCTV alerts. Local processing reduces latency and bandwidth and keeps critical operations responsive.
Big data “data lake” risk rises mainly due to:
A A. Poor governance controls
B B. Faster keyboards
C C. Smaller screens
D D. More printer pages
Without governance, data lakes become “data swamps” with unclear quality, ownership, and security. Proper metadata, access control, and data cataloging are needed for usable analytics.
Zero trust architecture assumes:
A B. All internal trusted
B C. Passwords are enough
C D. VPN is sufficient
D A. No implicit trust
Zero trust treats every request as untrusted until verified. It uses strong authentication, device checks, and least privilege to reduce breach impact from stolen credentials.
SOAR tools mainly improve security by:
A A. Automating incident workflows
B B. Disabling alerts
C C. Removing log storage
D D. Sharing admin accounts
SOAR automates steps like triage, enrichment, and response actions. This reduces response time and helps teams handle high alert volumes consistently and efficiently.
Green computing trade-off often involves:
A B. Color vs brightness
B C. Mouse vs keyboard
C A. Performance vs power use
D D. RAM vs USB
Reducing power consumption may limit peak performance if clocks and resources are constrained. Green computing aims to optimize both, using efficient hardware and smart workload scheduling.
Wearable privacy risk is highest when data is:
A B. Stored offline only
B A. Shared without consent
C C. Written on paper
D D. Kept locally encrypted
Wearables collect sensitive health and location data. If shared without clear consent or strong controls, it can be misused, exposing users to privacy loss and profiling.
Post-quantum cryptography is needed because:
A B. USB may corrupt files
B C. Cloud stops scaling
C D. VR needs fast GPU
D A. Quantum may break RSA
Powerful quantum algorithms could weaken widely used public-key cryptography like RSA and ECC. Post-quantum methods aim to keep encryption secure even against future quantum attacks.
Serverless cost can increase unexpectedly due to:
A B. Low traffic usage
B C. Fewer requests
C A. High invocation spikes
D D. Short executions
Serverless charges often depend on number of invocations and execution time. Sudden traffic spikes can trigger many runs and higher costs unless limits and monitoring are applied.
Multi-tenant SaaS risk is most related to:
A A. Data isolation failure
B B. Bigger monitor size
C C. Slow typing speed
D D. Printer queue length
Multi-tenant systems share infrastructure across customers. If isolation controls fail, one tenant may access another’s data. Strong access control and secure architecture prevent such leakage.
In remote work security, “conditional access” means:
A B. Access for everyone
B C. Access by location only
C A. Access based on risk
D D. Access without MFA
Conditional access uses signals like device health, location, and behavior to allow or block logins. It strengthens security by adapting access decisions to risk level.
VM snapshots are not a full backup because:
A A. Depend on base disks
B B. Encrypt automatically
C C. Improve network speed
D D. Reduce CPU usage
Snapshots track changes from a base disk and can become corrupt if storage fails. Full backups copy data independently and are safer for disaster recovery than snapshots alone.
Container security improves most by:
A B. Running as root
B C. Adding more packages
C D. Disabling updates
D A. Minimal base images
Minimal images reduce attack surface by removing unnecessary tools and libraries. Combined with scanning and patching, they reduce vulnerabilities and strengthen container security.
In CI/CD, a “rollback” is used to:
A B. Increase new features
B C. Add more bugs
C A. Restore previous release
D D. Skip testing stage
Rollback returns to a stable previous version if a new release fails. It reduces downtime and limits impact while teams fix issues and redeploy a corrected version.
ETL can become ELT when:
A B. Load happens last
B A. Transform happens after load
C C. Extract is skipped
D D. Only files are copied
In ELT, raw data is loaded first into a warehouse or lakehouse, then transformed using powerful compute. This supports flexible analytics and large-scale processing.
Tokenization in payments mainly protects:
A A. Card number exposure
B B. Screen brightness
C C. CPU temperature
D D. Printer ink level
Tokenization replaces real card details with tokens. Even if intercepted, tokens are less useful to attackers, reducing fraud risk and improving payment data security.
TLS is essential for e-commerce because it:
A B. Stores files offline
B C. Speeds up printers
C A. Encrypts client-server traffic
D D. Removes user login
TLS encrypts data between the browser and server, protecting passwords and payment details from interception and tampering. It builds trust and is a baseline for secure online transactions.
Social engineering attacks succeed mainly due to:
A A. Human trust exploitation
B B. High CPU usage
C C. Large screen size
D D. Fast internet speed
Social engineering manipulates people into revealing secrets or taking unsafe actions. Training, verification habits, and strict procedures reduce success of phishing and impersonation attempts.
Open-source supply chain risk includes:
A B. Strong peer review
B C. Encrypted storage
C A. Malicious dependency update
D D. Offline installation
Attackers may compromise a library or inject malware into updates. Using dependency pinning, scanning, and trusted sources helps reduce supply-chain risks in open-source usage.
For exam revision, “spaced repetition” works because it:
A B. Removes need for tests
B A. Reinforces memory over time
C C. Encourages cramming
D D. Avoids weak topics
Spaced repetition revisits information at planned intervals, strengthening long-term recall. It reduces forgetting and is effective for definitions, abbreviations, and commonly tested concepts.
A strong error log should record:
A A. Error type and cause
B B. Only total marks
C C. Only time left
D D. Only lucky guesses
Recording the cause—concept gap, misread keyword, or careless click—helps fix the root problem. This makes the error log a practical tool for accuracy improvement.
PYQ analysis becomes misleading if:
A B. Timer is used
B C. Notes are updated
C D. Practice is regular
D A. Syllabus changed later
If the syllabus or pattern changed, old PYQs may not reflect current exam focus. Always verify current syllabus and then use PYQs to understand likely question styles.
Time management improves most with:
A B. Random attempt order
B A. Section time budgets
C C. Only long questions first
D D. Ignoring timer
Setting time budgets per section prevents spending too long on difficult areas. It improves completion rate and helps ensure easier questions are not missed due to poor pacing.
Under negative marking, best guessing method is:
A B. Always choose C
B C. Pick longest option
C A. Elimination-based attempt
D D. Use random selection
Eliminating wrong options increases success probability and reduces negative marking risk. It is safer than blind guessing and supports better score outcomes in objective tests.
A full-length mock should be used to measure:
A A. Stamina and pacing
B B. Keyboard warranty
C C. Printer speed
D D. Screen resolution
Full mocks replicate exam duration and pressure. They reveal fatigue points and pacing issues, helping you adjust strategy so performance remains stable until the last question.
Analytics review is strongest when it tracks:
A B. Wallpaper themes
B C. Mouse model
C A. Time per topic
D D. Speaker volume
Time-per-topic shows where you spend too long. This helps target practice on slow areas and improve speed without sacrificing accuracy, boosting overall exam performance.
Improvement plan should prioritize topics with:
A B. Highest interest only
B A. High mistakes frequency
C C. Lowest weight always
D D. No PYQ history
Fixing frequent mistakes yields fast score gains. Prioritizing high-error topics reduces repeated losses and improves confidence, especially when those topics also carry high weight.
Smart guessing should be avoided when:
A A. No option eliminated
B B. Two options removed
C C. Partial concept known
D D. Penalty is low
Without eliminating any choice, guessing becomes random. Under negative marking, random guesses can reduce score, so leaving the question is often safer.
Stress management in long CBT exams improves by:
A B. Skipping all mocks
B C. Studying without breaks
C A. Practiced mock routine
D D. Changing strategy often
A consistent mock routine builds comfort with time pressure and reduces anxiety. Familiarity improves focus and helps maintain stable performance across the full exam duration.
Mind maps are best for:
A A. Visual concept connections
B B. Long essay writing
C C. Password storage
D D. Printer driver updates
Mind maps connect topics and subtopics visually, improving understanding and recall. They are useful for revision chapters where many terms and trends must be remembered together.
Quick revision charts should emphasize:
A B. Long explanations
B C. Story paragraphs
C D. Full textbook pages
D A. Keywords and formulas
Charts work best as short summaries. Highlighting keywords and formulas supports fast recall in final revision and prevents wasting time rereading full chapters.
Keyboard mastery reduces time loss by:
A B. Bigger keycaps
B C. More backspace use
C A. Faster navigation shortcuts
D D. Slower typing speed
Shortcuts reduce extra clicks and speed navigation in CBT exams. This saves seconds per question, which adds up across many questions and improves overall time management.
Typing drills should focus on:
A A. Accuracy then speed
B B. Speed only
C C. Copy paste only
D D. Auto-correct reliance
Correct typing habits reduce errors and correction time. Once accuracy is stable, speed can increase naturally through repetition, improving performance in typing-based CBT tasks.
Exam notifications must be checked because they can change:
A B. Keyboard layout
B A. Pattern and dates
C C. Printer brand
D D. Monitor size
Notifications are official sources for exam dates, pattern updates, and rules. Missing these updates can derail preparation even if the syllabus is well studied.
A computer abbreviations list is essential because:
A B. It increases file size
B C. It reduces speed
C A. MCQs test expansions
D D. It replaces PYQs
Many computer exams ask expansions like LAN, URL, RAM, and HTTP. A revised list improves quick recall and avoids confusion between similar abbreviations.
Diagram practice helps most in:
A A. OSI and topology
B B. Music playlist making
C C. Photo editing
D D. Game level design
Network concepts are often diagram-based. Practicing OSI layers and topologies improves understanding of data flow and helps solve conceptual MCQs faster and more accurately.
A good online platform should provide:
A B. Only questions
B A. Explanations and analytics
C C. No timer
D D. No solutions
Explanations teach the reasoning behind answers, and analytics shows weak areas and time usage. Together they make practice more effective than simple question lists.
A weekly assessment plan is best if it includes:
A B. Only one mock
B C. Only reading notes
C D. No error log
D A. Test, review, retest
Testing finds gaps, review fixes them, and retesting confirms improvement. This cycle steadily increases accuracy and speed and prevents repeating the same mistakes.
“Attempt strategy” should be adapted mainly based on:
A A. Mock performance data
B B. Friend suggestions
C C. Random changes
D D. Social media tips
Mock data shows real weaknesses and time issues. Adapting strategy using evidence improves results faster than following generic advice not matched to your performance.
Chapter-wise PYQ use is best when combined with:
A B. Only guessing
B C. Only shortcuts
C A. Concept revision notes
D D. Only current affairs
PYQs test concepts, and notes explain them clearly. Combining both builds understanding and helps solve new questions that use the same topic in different wording.
Overfitting risk in AI models rises when:
A B. Data is diverse
B A. Training data is narrow
C C. Regularization used
D D. Testing is proper
When training data is limited or repetitive, models may memorize patterns instead of generalizing. Diverse data, validation, and regularization help reduce overfitting and improve real-world accuracy.
“Cloud vendor lock-in” risk increases when:
A A. Using proprietary services
B B. Using open standards
C C. Using containers
D D. Using portability tools
Vendor lock-in happens when systems depend heavily on provider-specific tools. Portability becomes difficult and switching costs rise, so using open standards and containers helps reduce this risk.
A key reason to run sectional practice is:
A B. Avoid weak topics
B C. Reduce learning
C A. Target time bottlenecks
D D. Increase random attempts
Sectional practice identifies topics where speed is low. Fixing time bottlenecks improves pacing and ensures you attempt enough questions, raising overall scoring potential.
Final week revision should prioritize:
A B. New heavy topics
B C. Random browsing
C D. Only current affairs
D A. Error log and mocks
Final week focus should be on correcting repeated mistakes and refining exam strategy. Error logs and timed mocks give the highest return by improving accuracy and confidence quickly.