1. Commonwealth Day, Independence Day of Mauritius, Central Industrial Security Force Day, Foundation Day

Answer: 2017-03-12 00:00:00

Reply

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->Whats the day of/date of "Commonwealth Day, Independence Day of Mauritius, Central Industrial Security Force Day, Foundation Day"....
QA->Commonwealth Day, Independence Day of Mauritius, Central Industrial Security Force Day, Foundation Day....
QA->Whats the day of/date of "Central Industrial Security Force Raising Day"....
QA->Whats the day of/date of "Central Industrial Security Force Raising Day (India)"....
QA->Central Industrial Security Force Raising Day....
MCQ-> The broad scientific understanding today is that our planet is experiencing a warming trend over and above natural and normal variations that is almost certainly due to human activities associated with large-scale manufacturing. The process began in the late 1700s with the Industrial Revolution, when manual labor, horsepower, and water power began to be replaced by or enhanced by machines. This revolution, over time, shifted Britain, Europe, and eventually North America from largely agricultural and trading societies to manufacturing ones, relying on machinery and engines rather than tools and animals.The Industrial Revolution was at heart a revolution in the use of energy and power. Its beginning is usually dated to the advent of the steam engine, which was based on the conversion of chemical energy in wood or coal to thermal energy and then to mechanical work primarily the powering of industrial machinery and steam locomotives. Coal eventually supplanted wood because, pound for pound, coal contains twice as much energy as wood (measured in BTUs, or British thermal units, per pound) and because its use helped to save what was left of the world's temperate forests. Coal was used to produce heat that went directly into industrial processes, including metallurgy, and to warm buildings, as well as to power steam engines. When crude oil came along in the mid- 1800s, still a couple of decades before electricity, it was burned, in the form of kerosene, in lamps to make light replacing whale oil. It was also used to provide heat for buildings and in manufacturing processes, and as a fuel for engines used in industry and propulsion.In short, one can say that the main forms in which humans need and use energy are for light, heat, mechanical work and motive power, and electricity which can be used to provide any of the other three, as well as to do things that none of those three can do, such as electronic communications and information processing. Since the Industrial Revolution, all these energy functions have been powered primarily, but not exclusively, by fossil fuels that emit carbon dioxide (CO2), To put it another way, the Industrial Revolution gave a whole new prominence to what Rochelle Lefkowitz, president of Pro-Media Communications and an energy buff, calls "fuels from hell" - coal, oil, and natural gas. All these fuels from hell come from underground, are exhaustible, and emit CO2 and other pollutants when they are burned for transportation, heating, and industrial use. These fuels are in contrast to what Lefkowitz calls "fuels from heaven" -wind, hydroelectric, tidal, biomass, and solar power. These all come from above ground, are endlessly renewable, and produce no harmful emissions.Meanwhile, industrialization promoted urbanization, and urbanization eventually gave birth to suburbanization. This trend, which was repeated across America, nurtured the development of the American car culture, the building of a national highway system, and a mushrooming of suburbs around American cities, which rewove the fabric of American life. Many other developed and developing countries followed the American model, with all its upsides and downsides. The result is that today we have suburbs and ribbons of highways that run in, out, and around not only America s major cities, but China's, India's, and South America's as well. And as these urban areas attract more people, the sprawl extends in every direction.All the coal, oil, and natural gas inputs for this new economic model seemed relatively cheap, relatively inexhaustible, and relatively harmless-or at least relatively easy to clean up afterward. So there wasn't much to stop the juggernaut of more people and more development and more concrete and more buildings and more cars and more coal, oil, and gas needed to build and power them. Summing it all up, Andy Karsner, the Department of Energy's assistant secretary for energy efficiency and renewable energy, once said to me: "We built a really inefficient environment with the greatest efficiency ever known to man."Beginning in the second half of the twentieth century, a scientific understanding began to emerge that an excessive accumulation of largely invisible pollutants-called greenhouse gases - was affecting the climate. The buildup of these greenhouse gases had been under way since the start of the Industrial Revolution in a place we could not see and in a form we could not touch or smell. These greenhouse gases, primarily carbon dioxide emitted from human industrial, residential, and transportation sources, were not piling up along roadsides or in rivers, in cans or empty bottles, but, rather, above our heads, in the earth's atmosphere. If the earth's atmosphere was like a blanket that helped to regulate the planet's temperature, the CO2 buildup was having the effect of thickening that blanket and making the globe warmer.Those bags of CO2 from our cars float up and stay in the atmosphere, along with bags of CO2 from power plants burning coal, oil, and gas, and bags of CO2 released from the burning and clearing of forests, which releases all the carbon stored in trees, plants, and soil. In fact, many people don't realize that deforestation in places like Indonesia and Brazil is responsible for more CO2 than all the world's cars, trucks, planes, ships, and trains combined - that is, about 20 percent of all global emissions. And when we're not tossing bags of carbon dioxide into the atmosphere, we're throwing up other greenhouse gases, like methane (CH4) released from rice farming, petroleum drilling, coal mining, animal defecation, solid waste landfill sites, and yes, even from cattle belching. Cattle belching? That's right-the striking thing about greenhouse gases is the diversity of sources that emit them. A herd of cattle belching can be worse than a highway full of Hummers. Livestock gas is very high in methane, which, like CO2, is colorless and odorless. And like CO2, methane is one of those greenhouse gases that, once released into the atmosphere, also absorb heat radiating from the earth's surface. "Molecule for molecule, methane's heat-trapping power in the atmosphere is twenty-one times stronger than carbon dioxide, the most abundant greenhouse gas.." reported Science World (January 21, 2002). “With 1.3 billion cows belching almost constantly around the world (100 million in the United States alone), it's no surprise that methane released by livestock is one of the chief global sources of the gas, according to the U.S. Environmental Protection Agency ... 'It's part of their normal digestion process,' says Tom Wirth of the EPA. 'When they chew their cud, they regurgitate [spit up] some food to rechew it, and all this gas comes out.' The average cow expels 600 liters of methane a day, climate researchers report." What is the precise scientific relationship between these expanded greenhouse gas emissions and global warming? Experts at the Pew Center on Climate Change offer a handy summary in their report "Climate Change 101. " Global average temperatures, notes the Pew study, "have experienced natural shifts throughout human history. For example; the climate of the Northern Hemisphere varied from a relatively warm period between the eleventh and fifteenth centuries to a period of cooler temperatures between the seventeenth century and the middle of the nineteenth century. However, scientists studying the rapid rise in global temperatures during the late twentieth century say that natural variability cannot account for what is happening now." The new factor is the human factor-our vastly increased emissions of carbon dioxide and other greenhouse gases from the burning of fossil fuels such as coal and oil as well as from deforestation, large-scale cattle-grazing, agriculture, and industrialization.“Scientists refer to what has been happening in the earth’s atmosphere over the past century as the ‘enhanced greenhouse effect’”, notes the Pew study. By pumping man- made greenhouse gases into the atmosphere, humans are altering the process by which naturally occurring greenhouse gases, because of their unique molecular structure, trap the sun’s heat near the earth’s surface before that heat radiates back into space."The greenhouse effect keeps the earth warm and habitable; without it, the earth's surface would be about 60 degrees Fahrenheit colder on average. Since the average temperature of the earth is about 45 degrees Fahrenheit, the natural greenhouse effect is clearly a good thing. But the enhanced greenhouse effect means even more of the sun's heat is trapped, causing global temperatures to rise. Among the many scientific studies providing clear evidence that an enhanced greenhouse effect is under way was a 2005 report from NASA's Goddard Institute for Space Studies. Using satellites, data from buoys, and computer models to study the earth's oceans, scientists concluded that more energy is being absorbed from the sun than is emitted back to space, throwing the earth's energy out of balance and warming the globe."Which of the following statements is correct? (I) Greenhouse gases are responsible for global warming. They should be eliminated to save the planet (II) CO2 is the most dangerous of the greenhouse gases. Reduction in the release of CO2 would surely bring down the temperature (III) The greenhouse effect could be traced back to the industrial revolution. But the current development and the patterns of life have enhanced their emissions (IV) Deforestation has been one of the biggest factors contributing to the emission of greenhouse gases Choose the correct option:...
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ...
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you answer some of the questions.At the heart of what makes India a better regime than China is a healthy respect for the civil rights and liberties of its citizens. There are checks and balances in our government. But India’s new surveillance programme, the Central Monitoring system (CMS), resembles a dystopian society akin to George Orwell’s 1984.According to several news reports, the CMS gives the government, Indian security agencies and income tax (IT) officials the authority to listen to, and tape phone conversions, read emails and text messages, monitor Posts on Facebook, Twitter or Linkedin and track searches on Google of selected targets, without oversight by the courts or parliament. To call it sweeping is an understatement.Typically, Indian Security agencies need a court order for surveillance, or depend on Internet/telephone service providers for data, provided they supply a warrant. CMS allows the government to bypass the court.  Milind Deora, India’s Minister of State for Information Technology says the new system will actually improve citizens’ privacy because telecommunication agencies would no longer be directly involved in the surveillance; only government officials would have these details – missing the point that in a democracy, there has to be freedom from government surveillance. This is hardly comforting in a nation riddled with governmental corruption.India does not have a privacy law. CMS will operate under the Indian Telegraph Act (ITA). The ITA is a relic of the British Raj from 1885, and gives the government the freedom to monitor private conversations. News reports quote anonymous telecommunications ministry officials as saying that CMS has been introduced for security purposes, and “this is to protect you and your country”.That is irrational. For one, there are no ‘security purposes’ that prevent the government from having a rational debate on this programme and getting approval from our elected representatives before authorizing such wide-reaching surveillance. If the government is worried that a public debate in a paralysed parliament would half the programme’s progress, then it can convene a committee of individuals or an individual body such as CAG to oversee the programme. It can seek judicial approval from the Supreme Court, and have a judge sign off on surveillance requests without making these requests public.As of now, the top bureaucrat in the interior ministry and his/her state level deputies will have the power to approve surveillance requests. Even the recently revealed US surveillance Programme, had ‘behind the doors’ bipartisan surveillance approval. Furthermore, US investigation agencies such as the CIA and NSA are not the ruling party’s marionettes; in India, that the CBI is an arm of the government is a fait accompli. Even the Supreme Court recently lambasted the CBI and asked it to guarantee its independence from government influences after it was proved that it shared unreleased investigation reports with the government.There is no guarantee that this top bureaucrat will be judicious or not use this as a tool to pursue political and personal vendettas against opposition parties or open critics of the government. Security purposes hardly justify monitoring an individual’s social media usage. No terrorist announces plans to bomb a building on Facebook. Neither do Maoists espouse Twitter as their preferred form of communication.Presumably, security purposes could be defined as the government’s need to intercept terrorist plans. How does giving the IT department the same sweeping surveillance powers justify security purposes? The IT office already has expansive powers to conduct investigations, summon individuals or company executives, and raid premises to catch tax evaders. In a world where most financial details are discussed and transferred online, allowing the IT departments to snoop on these without any reasonable cause is akin to airport authorities strip searching everyone who boards a flight.What happened on 26/11 or what happens regularly in Naxal – affected areas is extremely sad and should ideally, never take place again. But targeting terrorists means targeting people who show such inclinations, or those who arouse suspicions, either by their travels or heir associations with militant or extremist groups. And in a country where a teenager has been arrested for posting an innocent comment questioning the need for a bandh on the death of a political leader, gives us reason to believe that this law is most likely to be misused, if not abused. Select the word which is MOST OPPOSITE in meaning to the word printed in bold, as used in the passage. AKIN...
MCQ->Which of the following statement/s is/are correct regarding recent MoU between Indian and Mauritius: India, Mauritius sign MoU to promote Traditional Medicine and Homoeopathy recently. 2. The MoU was signed during the visit of MoS of AYUSH, Shri J P Nada to Mauritius. 3. It envisages exchange of experts, supply of traditional medicinal substances, joint research and development and recognition of the traditional systems of health and medicine in both countries....
MCQ-> Read the following case and choose the best alternative.Chetan Textile Mills (CTM) has initiated various employee welfare schemes for its employees since the day the mill began its operations. Due to its various welfare initiatives and socially responsible business practices, the organisation has developed an impeccable reputation. Majority of the regular workers in Chetan Mills had membership of Chetan Mills Mazdoor Sangh (CMMS), a non political trade union. CMMS had the welfare of its member as its guiding principle. Both CTM and CMMS addressed various worker related issues on a proactive basis. As a result no industrial dispute had been reported from the organiza tion in the recent past.These days majority of the employers deploy large number of contract labourers in their production processes. In an open economy survival of an organization depends on its competitiveness. In order to become competitive, an organization must be able to reduce cost and have flexibility in employment of resources. Engaging workers through contractors (contract labourer) reduces the overall labour cost by almost 50%. Indian labour legislations make reduction of regular workers almost impossible, but organisations can overcome this limitation by employing contract labourers. Contract labourers neither get the same benefit as regular employees nor do they have any job security. According to various recent surveys, government owned public sector units and other departments are the biggest employers of contract labourers in the country. Contractors, as middle - men, often exploit the contract labourers, and these government organizations have failed to stop the exploitation.Over time CTM started engaging a large number of contract labourers. At present, more than 35% of CM’s workers (total 5,000 in number) are contract labourers. CMMS leadership was wary about the slow erosion of its support base as regular workers slowly got replaced by contract workers and feared the day when regular workers would become a minority in the mill. So far, CMMS has refused to take contract labourers as members.Recently, based on rumours, CTM management started to investigate the alleged exploitation of contract labourers by certain contractors. Some contractors felt that such investigations may expose them and reduce their profit margin. They instigated contract labourers to demand for better wages. Some of the contract labourers engaged in material handling and cleaning work started provoking CTM management by adopting violent tactics.Today’s news - paper reports that police and CTM security guards fired two or three rounds in air to quell the mob. The trouble started while a security guard allegedly slapped one of the contract labourers following a heated argument. Angry labourers set fire to several vehicles parked inside the premises, and to the police jeeps.In the wake of recent happenings, what decision is expected from CTM management? From the combinations given below, choose the best sequence of action. I. Stop the current investigation against the contractors to ensure industrial peace; after all allegations were based on rumours. II. Continue investigation to expo se exploitation and take strong actions against trouble makers. III. Get in direct touch with all contract labourers through all possible means, communicate the need for current investigation to stop their exploitation, and convince them regarding CTM’s situation due to competition. Also expose those contractors who are creating problems. IV. Promise strong action against the security guards who are guilty. V. Increase the wages of contract labourers....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions