1. HOW MANY MEMBERS ARE THERE IN UNITED NATIONS SECURITY COUNCIL

Answer: 15

Reply

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->HOW MANY MEMBERS ARE THERE IN UNITED NATIONS SECURITY COUNCIL....
QA->In which country, the United Nations Security Council has approved the first-ever "offensive" UN peace keeping brigade to battle rebels group?....
QA->On October 12 2010, the United Nations General Assembly elected five countries to two-year seats on the Security Council. Name those countries?....
QA->Name of the alliance among Brazil, Germany, India and Japan for the purpose of supporting each other’s bids for permanent seats on the United Nations Security Council?....
QA->How many countries are members of the United Nations?....
MCQ-> The persistent patterns in the way nations fight reflect their cultural and historical traditions and deeply rooted attitudes that collectively make up their strategic culture. These patterns provide insights that go beyond what can be learnt just by comparing armaments and divisions. In the Vietnam War, the strategic tradition of the United States called for forcing the enemy to fight a massed battle in an open area, where superior American weapons would prevail. The United States was trying to re-fight World War II in the jungles of Southeast Asia, against an enemy with no intention of doing so. Some British military historians describe the Asian way of war as one of indirect attacks, avoiding frontal attacks meant to overpower an opponent. This traces back to Asian history and geography: the great distances and harsh terrain have often made it difficult to execute the sort of open-field clashes allowed by the flat terrain and relatively compact size of Europe. A very different strategic tradition arose in Asia. The bow and arrow were metaphors for an Eastern way of war. By its nature, the arrow is an indirect weapon. Fired from a distance of hundreds of yards, it does not necessitate immediate physical contact with the enemy. Thus, it can be fired from hidden positions. When fired from behind a ridge, the barrage seems to come out of nowhere, taking the enemy by surprise. The tradition of this kind of fighting is captured in the classical strategic writings of the East. The 2,000 years' worth of Chinese writings on war constitutes the most subtle writings on the subject in any language. Not until Clausewitz, did the West produce a strategic theorist to match the sophistication of Sun-tzu, whose Art of War was written 2,300 years earlier. In Sun-tzu and other Chinese writings, the highest achievement of arms is to defeat an adversary without fighting. He wrote: "To win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the supreme excellence." Actual combat is just one among many means towards the goal of subduing an adversary. War contains too many surprises to be a first resort. It can lead to ruinous losses, as has been seen time and again. It can have the unwanted effect of inspiring heroic efforts in an enemy, as the United States learned in Vietnam, and as the Japanese found out after Pearl Harbor. Aware of the uncertainties of a military campaign, Sun-tzu advocated war only after the most thorough preparations. Even then it should be quick and clean. Ideally, the army is just an instrument to deal the final blow to an enemy already weakened by isolation, poor morale, and disunity. Ever since Sun-tzu, the Chinese have been seen as masters of subtlety who take measured actions to manipulate an adversary without his knowledge. The dividing line between war and peace can be obscure. Low-level violence often is the backdrop to a larger strategic campaign. The unwitting victim, focused on the day-to-day events, never realizes what's happening to him until it's too late. History holds many examples. The Viet Cong lured French and U.S. infantry deep into the jungle, weakening their morale over several years. The mobile army of the United States was designed to fight on the plains of Europe, where it could quickly move unhindered from one spot to the next. The jungle did more than make quick movement impossible; broken down into smaller units and scattered in isolated bases, US forces were deprived of the feeling of support and protection that ordinarily comes from being part of a big army. The isolation of U.S. troops in Vietnam was not just a logistical detail, something that could be overcome by, for instance, bringing in reinforcements by helicopter. In a big army reinforcements are readily available. It was Napoleon who realized the extraordinary effects on morale that come from being part of a larger formation. Just the knowledge of it lowers the soldier's fear and increases his aggressiveness. In the jungle and on isolated bases, this feeling was removed. The thick vegetation slowed down the reinforcements and made it difficult to find stranded units. Soldiers felt they were on their own. More important, by altering the way the war was fought, the Viet Cong stripped the United States of its belief in the inevitability of victory, as it had done to the French before them. Morale was high when these armies first went to Vietnam. Only after many years of debilitating and demoralizing fighting did Hanoi launch its decisive attacks, at Dienbienphu in 1954 and against Saigon in 1975. It should be recalled that in the final push to victory the North Vietnamese abandoned their jungle guerrilla tactics completely, committing their entire army of twenty divisions to pushing the South Vietnamese into collapse. This final battle, with the enemy's army all in one place, was the one that the United States had desperately wanted to fight in 1965. When it did come out into the open in 1975, Washington had already withdrawn its forces and there was no possibility of re-intervention. The Japanese early in World War II used a modern form of the indirect attack, one that relied on stealth and surprise for its effect. At Pearl Harbor, in the Philippines, and in Southeast Asia, stealth and surprise were attained by sailing under radio silence so that the navy's movements could not be tracked. Moving troops aboard ships into Southeast Asia made it appear that the Japanese army was also "invisible." Attacks against Hawaii and Singapore seemed, to the American and British defenders, to come from nowhere. In Indonesia and the Philippines the Japanese attack was even faster than the German blitz against France in the West. The greatest military surprises in American history have all been in Asia. Surely there is something going on here beyond the purely technical difficulties of detecting enemy movements. Pearl Harbor, the Chinese intervention in Korea, and the Tet offensive in Vietnam all came out of a tradition of surprise and stealth. U.S. technical intelligence – the location of enemy units and their movements was greatly improved after each surprise, but with no noticeable improvement in the American ability to foresee or prepare what would happen next. There is a cultural divide here, not just a technical one. Even when it was possible to track an army with intelligence satellites, as when Iraq invaded Kuwait or when Syria and Egypt attacked Israel, surprise was achieved. The United States was stunned by Iraq's attack on Kuwait even though it had satellite pictures of Iraqi troops massing at the border. The exception that proves the point that cultural differences obscure the West's understanding of Asian behavior was the Soviet Union's 1979 invasion of Afghanistan. This was fully anticipated and understood in advance. There was no surprise because the United States understood Moscow's worldview and thinking. It could anticipate Soviet action almost as well as the Soviets themselves, because the Soviet Union was really a Western country. The difference between the Eastern and the Western way of war is striking. The West's great strategic writer, Clausewitz, linked war to politics, as did Sun-tzu. Both were opponents of militarism, of turning war over to the generals. But there all similarity ends. Clausewitz wrote that the way to achieve a larger political purpose is through destruction of the enemy's army. After observing Napoleon conquer Europe by smashing enemy armies to bits, Clausewitz made his famous remark in On War (1932) that combat is the continuation of politics by violent means. Morale and unity are important, but they should be harnessed for the ultimate battle. If the Eastern way of war is embodied by the stealthy archer, the metaphorical Western counterpart is the swordsman charging forward, seeking a decisive showdown, eager to administer the blow that will obliterate the enemy once and for all. In this view, war proceeds along a fixed course and occupies a finite extent of time, like a play in three acts with a beginning, a middle, and an end. The end, the final scene, decides the issue for good. When things don't work out quite this way, the Western military mind feels tremendous frustration. Sun-tzu's great disciples, Mao Zedong and Ho Chi Minh, are respected in Asia for their clever use of indirection and deception to achieve an advantage over stronger adversaries. But in the West their approach is seen as underhanded and devious. To the American strategic mind, the Viet Cong guerrilla did not fight fairly. He should have come out into the open and fought like a man, instead of hiding in the jungle and sneaking around like a cat in the night. According to the author, the main reason for the U.S. losing the Vietnam war was
 ...
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ...
MCQ->Which of the following are correct about the constitution of National Security Council of India ? National Security Council has been constituted which includes cabinet Cabinet committee on Security. Indian Defence Minister is the chairman of the cabinet committee on National Security Council Union Home Minister is the Member secretary of the Security Council...
MCQ-> on the basis of the information given in the following case. Teknik Group of industries had businesses in different sectors ranging from manufacturing, construction, fish farming and hotels. These different businesses operated as semi-independent units managed by the unit level managers. Teknik’s management had an internal consultancy group called as Business Advisory Group (known internally as BAG). The 15 experts in BAG were hired personally by Mr. Teknikwala, the owner of Teknik, who wanted this core group of experts to help his organization grow fast without facing the typical growth hurdles. Most of them were specialists in fields like law, information technology, human resource management, and operations management. Almost all of them had experience spanning decades in the industry. Whenever any of the units faced any significant all units and it represented an extra work for those who were involved. This coordination was required to understand the different work processes and the users’ requirements. This coordination activity was being extensively managed by the old timers as they were familiar with internal processes and people in the different units. An external consultant was also hired for customization and implementation After two months, BAG teams had to fortnightly present their progress to Ms. Teknikwali’s team. In the last meeting Ms. Teknikwali was dissatisfied. She explained her thinking that since ERP impacted every aspect of the business, the roll out had to be done faster. She wanted Mr. Shiv to get the implementation completed ahead of schedule. In the meeting she asked Mr. Shiv to get the people in IT team to be more productive. Not willing to disagree, Mr. Shiv committed to a roll-out schedule of complete ERP system in 6 months instead of earlier decided 14 months. Next day, Mr. Shiv presented the revised project milestone to BAG members. He told them that in order to meet the deadline, the members were expected to work on week-ends till the completion of the project. Along with that, they were also expected to maintain their earlier standards of delivery time and quality for the normal trouble-shooting and internal advisory work. Mr. Shiv also pointed out that anyone whose performance did not meet the expectations would be subjected to formal disciplinary action. The meeting ended without any member commenting on Shiv’s ideas, although Mr. Shiv heard a lot of mumbling in the corridor. Over the week, Shiv noticed that the members seemed to avoid him and he had to make extra effort to get ideas from them. After a fortnight Shiv reviewed the attendance register and found the Mr. Lal, an old time member, had not come during the week-ends and certain decisions were held up due to lack of inputs from Mr. Lal. Mr. Shiv issued a written reprimand to Mr. Lal. He was speechless on receiving the reprimand but kept silent. It has been three days since that incident. Some of the senior members had put in request for transfer to other business units. It was rumoured that four problems, the unit level managers would put up a request for help to BAG. The problems ranged from installation of internal MIS systems, to financial advice related to leasing of equipment, to handling of employee grievances. Over a period of 20 years, Teknik’s revenues grew from 100 crore 10,000 crore with guidance of BAG and due to Mr. Tekinwala’s vision. Given its reputation in the industry, many people wanted to start their careers in BAG. Often young MBAs fresh out of business schools would apply. However their applications used to be rejected by Mr. Teknikwala, who had a preference for people with extensive industry experience. Things changed after the unfortunate demise of Mr. Teknikwala. His daughter Miss. Teknikwali took up the family business. She was an MBA from one of the premier business schools, and was working in a different company when Mr. Tekinwala passed away. She preferred that BAG developed new ideas and therefore inducted freshly graduated MBAs from premier business schools. She personally supervised the recruitment and selection process. Now the entire group constituted of 50 specialists, out of which 35 were the old time members. She also changed the reporting relationships in the BAG group with some of the older members being made to report to the new members. In IT team, Mr. Shiv, a newly recruited MBA, was made in-charge. For the older members it was a shock. However, as most of them were on the verge of retirement, and it would be challenging to search for new jobs while competing with younger professionals, they decided to play along. After one month, all business units were caught up in the ERP fever. This was an idea pushed by Ms. Teknikwali who the need the need to replace the old legacy systems with latest ERP system integrating all the units of Teknik. This was heavily influenced by her experience in the previous where an ERP system was already up and running. Therefore she was not aware of the difference between installing an ERP system and working on an already installed one. The ERP mplementation in Teknik Group required extensive coordination with senior level managers of senior legal experts had agreed to an offer from a law firm. Other senior members would sporadically come in late to work, citing health reasons. Almost all senior members now wanted a weekly work-routine to be prepared and given to them in advance so that they could deliver as per the schedule. This insistence on written communication was a problem as urgent problems or ad-hoc requests could not be foreseen and included. Also normal services to other business units were being unattended to, and there were complaints coming from the unit heads.Which of the following could have been a better response of Mr. Shiv to Ms. Teknikwali’s request to re-schedule the ERP implementation?...
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you answer some of the questions.At the heart of what makes India a better regime than China is a healthy respect for the civil rights and liberties of its citizens. There are checks and balances in our government. But India’s new surveillance programme, the Central Monitoring system (CMS), resembles a dystopian society akin to George Orwell’s 1984.According to several news reports, the CMS gives the government, Indian security agencies and income tax (IT) officials the authority to listen to, and tape phone conversions, read emails and text messages, monitor Posts on Facebook, Twitter or Linkedin and track searches on Google of selected targets, without oversight by the courts or parliament. To call it sweeping is an understatement.Typically, Indian Security agencies need a court order for surveillance, or depend on Internet/telephone service providers for data, provided they supply a warrant. CMS allows the government to bypass the court.  Milind Deora, India’s Minister of State for Information Technology says the new system will actually improve citizens’ privacy because telecommunication agencies would no longer be directly involved in the surveillance; only government officials would have these details – missing the point that in a democracy, there has to be freedom from government surveillance. This is hardly comforting in a nation riddled with governmental corruption.India does not have a privacy law. CMS will operate under the Indian Telegraph Act (ITA). The ITA is a relic of the British Raj from 1885, and gives the government the freedom to monitor private conversations. News reports quote anonymous telecommunications ministry officials as saying that CMS has been introduced for security purposes, and “this is to protect you and your country”.That is irrational. For one, there are no ‘security purposes’ that prevent the government from having a rational debate on this programme and getting approval from our elected representatives before authorizing such wide-reaching surveillance. If the government is worried that a public debate in a paralysed parliament would half the programme’s progress, then it can convene a committee of individuals or an individual body such as CAG to oversee the programme. It can seek judicial approval from the Supreme Court, and have a judge sign off on surveillance requests without making these requests public.As of now, the top bureaucrat in the interior ministry and his/her state level deputies will have the power to approve surveillance requests. Even the recently revealed US surveillance Programme, had ‘behind the doors’ bipartisan surveillance approval. Furthermore, US investigation agencies such as the CIA and NSA are not the ruling party’s marionettes; in India, that the CBI is an arm of the government is a fait accompli. Even the Supreme Court recently lambasted the CBI and asked it to guarantee its independence from government influences after it was proved that it shared unreleased investigation reports with the government.There is no guarantee that this top bureaucrat will be judicious or not use this as a tool to pursue political and personal vendettas against opposition parties or open critics of the government. Security purposes hardly justify monitoring an individual’s social media usage. No terrorist announces plans to bomb a building on Facebook. Neither do Maoists espouse Twitter as their preferred form of communication.Presumably, security purposes could be defined as the government’s need to intercept terrorist plans. How does giving the IT department the same sweeping surveillance powers justify security purposes? The IT office already has expansive powers to conduct investigations, summon individuals or company executives, and raid premises to catch tax evaders. In a world where most financial details are discussed and transferred online, allowing the IT departments to snoop on these without any reasonable cause is akin to airport authorities strip searching everyone who boards a flight.What happened on 26/11 or what happens regularly in Naxal – affected areas is extremely sad and should ideally, never take place again. But targeting terrorists means targeting people who show such inclinations, or those who arouse suspicions, either by their travels or heir associations with militant or extremist groups. And in a country where a teenager has been arrested for posting an innocent comment questioning the need for a bandh on the death of a political leader, gives us reason to believe that this law is most likely to be misused, if not abused. Select the word which is MOST OPPOSITE in meaning to the word printed in bold, as used in the passage. AKIN...
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions