1. Contractor’s security deposit is realized under:

Answer: Art.287 kfc vol.1

Reply

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->Contractor’s security deposit is realized under:....
QA->All purchases costing below …………. will be exempted from the requirement of security deposit.....
QA->A successful bidder on a tendered public work is bound to deposit a security at the rate of ………of the PAC.....
QA->Security deposit of private employer of a Government employee is prescribed in:....
QA->Repayment of security deposit is based on :....
MCQ-> based on the case given below. Ethical – a person is called unethical, when he deviates from principles. The principles and their use is often guided by two definitions: Moral: society’s code for individual survival Ethics: An individual’s code for society survival Naresh was a small time civil contractor in a small city. His major clients were the residents who wanted ad-hoc work like painting, building extensions to be done. His just prices had made him a preferred contractor for most of the clients who preferred him over other civil contractors. Always he followed the principle that client had to be kept happy – only by doing so it would be a win-win situation for both. However due to the unpredictability of such orders from residents, Naresh used to be idle for substantial part of the year. As a consequence, he could not expand his business. His two children were growing up and his existing business could not support their expenses. The medical expense of his elderly parents was another drain on his resources. The constant rise of prices in medical care and medicines was another issue. For Naresh, family’s concern was predominant. Naresh was, therefore, under pressure to expand his business. He was the sole earning member of his family, and he had to ensure their well being. He thought that by expanding his business, not only would he be able to care for his family in a better way, as well as offer employment to more number of masons and labourers. That would benefit their families as well. Naresh drew the boundary of his society to include himself, his family members, his employees and their family members. For expansion, the only option in the city was to enlist= as a contractor for government work. Before deciding, he sought advice from another contractor, Srikumar, who had been working on government projects for a long period of time. Srikumar followed the principle of always helping others, because he believed that he would be helped back in return some day. Srikumar had just one advice “The work is given to those who will win the bidding process and at the same time will give the maximum bribe. Prices quoted for work have to include bribes, else the bills will not get cleared and the supervisors will find multiple faults with the execution of work. This ensures survival and prosperity for contractors”. When asked about other contractors, Srikumar said “The government contractors are like a micro-society in themselves, almost like a brotherhood. Within that, they are highly competitive; however towards any external threat they are united to ensure no harm happens to any of their members”.Naresh decided to work as a government contractor. Following Srikumar’s advice, he inflated the prices so that he could pay the bribes out the bills received....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ...
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you answer some of the questions.At the heart of what makes India a better regime than China is a healthy respect for the civil rights and liberties of its citizens. There are checks and balances in our government. But India’s new surveillance programme, the Central Monitoring system (CMS), resembles a dystopian society akin to George Orwell’s 1984.According to several news reports, the CMS gives the government, Indian security agencies and income tax (IT) officials the authority to listen to, and tape phone conversions, read emails and text messages, monitor Posts on Facebook, Twitter or Linkedin and track searches on Google of selected targets, without oversight by the courts or parliament. To call it sweeping is an understatement.Typically, Indian Security agencies need a court order for surveillance, or depend on Internet/telephone service providers for data, provided they supply a warrant. CMS allows the government to bypass the court.  Milind Deora, India’s Minister of State for Information Technology says the new system will actually improve citizens’ privacy because telecommunication agencies would no longer be directly involved in the surveillance; only government officials would have these details – missing the point that in a democracy, there has to be freedom from government surveillance. This is hardly comforting in a nation riddled with governmental corruption.India does not have a privacy law. CMS will operate under the Indian Telegraph Act (ITA). The ITA is a relic of the British Raj from 1885, and gives the government the freedom to monitor private conversations. News reports quote anonymous telecommunications ministry officials as saying that CMS has been introduced for security purposes, and “this is to protect you and your country”.That is irrational. For one, there are no ‘security purposes’ that prevent the government from having a rational debate on this programme and getting approval from our elected representatives before authorizing such wide-reaching surveillance. If the government is worried that a public debate in a paralysed parliament would half the programme’s progress, then it can convene a committee of individuals or an individual body such as CAG to oversee the programme. It can seek judicial approval from the Supreme Court, and have a judge sign off on surveillance requests without making these requests public.As of now, the top bureaucrat in the interior ministry and his/her state level deputies will have the power to approve surveillance requests. Even the recently revealed US surveillance Programme, had ‘behind the doors’ bipartisan surveillance approval. Furthermore, US investigation agencies such as the CIA and NSA are not the ruling party’s marionettes; in India, that the CBI is an arm of the government is a fait accompli. Even the Supreme Court recently lambasted the CBI and asked it to guarantee its independence from government influences after it was proved that it shared unreleased investigation reports with the government.There is no guarantee that this top bureaucrat will be judicious or not use this as a tool to pursue political and personal vendettas against opposition parties or open critics of the government. Security purposes hardly justify monitoring an individual’s social media usage. No terrorist announces plans to bomb a building on Facebook. Neither do Maoists espouse Twitter as their preferred form of communication.Presumably, security purposes could be defined as the government’s need to intercept terrorist plans. How does giving the IT department the same sweeping surveillance powers justify security purposes? The IT office already has expansive powers to conduct investigations, summon individuals or company executives, and raid premises to catch tax evaders. In a world where most financial details are discussed and transferred online, allowing the IT departments to snoop on these without any reasonable cause is akin to airport authorities strip searching everyone who boards a flight.What happened on 26/11 or what happens regularly in Naxal – affected areas is extremely sad and should ideally, never take place again. But targeting terrorists means targeting people who show such inclinations, or those who arouse suspicions, either by their travels or heir associations with militant or extremist groups. And in a country where a teenager has been arrested for posting an innocent comment questioning the need for a bandh on the death of a political leader, gives us reason to believe that this law is most likely to be misused, if not abused. Select the word which is MOST OPPOSITE in meaning to the word printed in bold, as used in the passage. AKIN...
MCQ-> Read the following information carefully and answer the questions given below: Following are the conditions for short listing candidates for the post of Marketing officer for Payment bank. The candidate to be called for interview must (i) be a graduate in Science, i.e. B.Sc, with minimum 55% marks. (ii) have at least 3 years experience in selling/marketing (iii) have participated in debating or drama or sports at the intercollegiate level onwards. (iv) have secured minimum 60% marks in the Written Examination (WE) (v) be ready to deposit Rs 10,000 as security deposit. However, in case of a candidate who fulfils all these criteria except (a) (iv) above, but has secured minimum 60% at B.Sc, may be referred to the Chief Manager (b) (i) above, but has passed M.Sc, i.e. Post Graduation in Science, with minimum 50% marks, may be referred to DGM Based on these criteria and information provided below, decide the course of action in each case. You are not to assume anything. If the data provided is not adequate given course of action, your answer will be ‘data inadequate’. All the candidates given below fulfill the criterion for age. Mark Answer If the decision is as follows a: Selection for Interview b: Not to be selected c: Data inadequate d: Refer to Chief Manager (C.R) e: Refer to the DGM(C.R)Deepika is a 26 years girl having obtained 60% marks in Post-Graduation. I.e M.sc,. 53 % and 64 % in B.sc and W.E . respectively .Deepika has worked as sales executive for three and half years.She has obtained many prizes in intercollegiate events in debating and ready to deposit Rs 10,000 as security deposit.
 ...
MCQ->Lankawala, another contractor, when faced with the new supervisor’s demand to reduce prices for government work, asked him to guarantee that no bribes would be taken, and only then prices would be reduced. This was said in front of everyone. At this the supervisor forced Lankawala out of the meeting and threatened to black-list him. Lankawala did not say anything and walked away. Blacklisting of a contractor by one government department implied that Lankawala would not be able to participate in any government departments’ works. In late evening, the city was abuzz with the news that the supervisor’s dead body was seen on the railway tracks. In the investigations that followed, no one who attended the meeting recounted the happenings in the meeting to the police. Getting involved in murder cases could lead to unpredictable outcomes such as becoming the potential suspect, or an accessory to the crime. Furthermore, cases could drag on for years, and one would have to appear in court as witnesses in response to court’s summons. This, for a contractor, was a serious threat to his business due to the disruptions created. However, Naresh wanted to speak out but was pressurized by Srikumar and other contractors not to, and as a result he did not. Due to this, the case was closed unresolved with no one found guilty. In this situation, it can be concluded that:...
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions