1. Name the first private person of India who was given 'Z' security cover by the Union Govt?





Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->The Central Intelligence Agency (CIA) has severed ties with private security firm, whose employees helped load the drone aircraft tasked with killing targets in Afghanistan and Pakistan. Name of that private security agency?....
QA->A regional office of a Govt. department wrote a letter to Govt. How this can be sent to Govt.?....
QA->A Govt.servant should obtain special permission of Govt:....
QA->Which programme was started by the Govt. of India with the objective of providing economic security to the rural women & to encourage the saving habit among them?....
QA->On 3 October 2013, the Union Cabinet approved the creation of a new state by bifurcating the existing state of Andhra Pradesh. What is the name given to the 29th state of the Indian union?....
MCQ-> The current debate on intellectual property rights (IPRs) raises a number of important issues concerning the strategy and policies for building a more dynamic national agricultural research system, the relative roles of public and private sectors, and the role of agribusiness multinational corporations (MNCs). This debate has been stimulated by the international agreement on Trade Related Intellectual Property Rights (TRIPs), negotiated as part of the Uruguay Round. TRIPs, for the first time, seeks to bring innovations in agricultural technology under a new worldwide IPR regime. The agribusiness MNCs (along with pharmaceutical companies) played a leading part in lobbying for such a regime during the Uruguay Round negotiations. The argument was that incentives are necessary to stimulate innovations, and that this calls for a system of patents which gives innovators the sole right to use (or sell/lease the right to use) their innovations for a specified period and protects them against unauthorised copying or use. With strong support of their national governments, they were influential in shaping the agreement on TRIPs, which eventually emerged from the Uruguay Round. The current debate on TRIPs in India - as indeed elsewhere - echoes wider concerns about ‘privatisation’ of research and allowing a free field for MNCs in the sphere of biotechnology and agriculture. The agribusiness corporations, and those with unbounded faith in the power of science to overcome all likely problems, point to the vast potential that new technology holds for solving the problems of hunger, malnutrition and poverty in the world. The exploitation of this potential should be encouraged and this is best done by the private sector for which patents are essential. Some, who do not necessarily accept this optimism, argue that fears of MNC domination are exaggerated and that farmers will accept their products only if they decisively outperform the available alternatives. Those who argue against agreeing to introduce an IPR regime in agriculture and encouraging private sector research are apprehensive that this will work to the disadvantage of farmers by making them more and more dependent on monopolistic MNCs. A different, though related apprehension is that extensive use of hybrids and genetically engineered new varieties might increase the vulnerability of agriculture to outbreaks of pests and diseases. The larger, longer-term consequences of reduced biodiversity that may follow from the use of specially bred varieties are also another cause for concern. Moreover, corporations, driven by the profit motive, will necessarily tend to underplay, if not ignore, potential adverse consequences, especially those which are unknown and which may manifest themselves only over a relatively long period. On the other hand, high-pressure advertising and aggressive sales campaigns by private companies can seduce farmers into accepting varieties without being aware of potential adverse effects and the possibility of disastrous consequences for their livelihood if these varieties happen to fail. There is no provision under the laws, as they now exist, for compensating users against such eventualities. Excessive preoccupation with seeds and seed material has obscured other important issues involved in reviewing the research policy. We need to remind ourselves that improved varieties by themselves are not sufficient for sustained growth of yields. in our own experience, some of the early high yielding varieties (HYVs) of rice and wheat were found susceptible to widespread pest attacks; and some had problems of grain quality. Further research was necessary to solve these problems. This largely successful research was almost entirely done in public research institutions. Of course, it could in principle have been done by private companies, but whether they choose to do so depends crucially on the extent of the loss in market for their original introductions on account of the above factors and whether the companies are financially strong enough to absorb the ‘losses’, invest in research to correct the deficiencies and recover the lost market. Public research, which is not driven by profit, is better placed to take corrective action. Research for improving common pool resource management, maintaining ecological health and ensuring sustainability is both critical and also demanding in terms of technological challenge and resource requirements. As such research is crucial to the impact of new varieties, chemicals and equipment in the farmer’s field, private companies should be interested in such research. But their primary interest is in the sale of seed materials, chemicals, equipment and other inputs produced by them. Knowledge and techniques for resource management are not ‘marketable’ in the same way as those inputs. Their application to land, water and forests has a long gestation and their efficacy depends on resolving difficult problems such as designing institutions for proper and equitable management of common pool resources. Public or quasi-public research institutions informed by broader, long-term concerns can only do such work. The public sector must therefore continue to play a major role in the national research system. It is both wrong and misleading to pose the problem in terms of public sector versus private sector or of privatisation of research. We need to address problems likely to arise on account of the public-private sector complementarity, and ensure that the public research system performs efficiently. Complementarity between various elements of research raises several issues in implementing an IPR regime. Private companies do not produce new varieties and inputs entirely as a result of their own research. Almost all technological improvement is based on knowledge and experience accumulated from the past, and the results of basic and applied research in public and quasi-public institutions (universities, research organisations). Moreover, as is increasingly recognised, accumulated stock of knowledge does not reside only in the scientific community and its academic publications, but is also widely diffused in traditions and folk knowledge of local communities all over. The deciphering of the structure and functioning of DNA forms the basis of much of modern biotechnology. But this fundamental breakthrough is a ‘public good’ freely accessible in the public domain and usable free of any charge. Various techniques developed using that knowledge can however be, and are, patented for private profit. Similarly, private corporations draw extensively, and without any charge, on germplasm available in varieties of plants species (neem and turmeric are by now famous examples). Publicly funded gene banks as well as new varieties bred by public sector research stations can also be used freely by private enterprises for developing their own varieties and seek patent protection for them. Should private breeders be allowed free use of basic scientific discoveries? Should the repositories of traditional knowledge and germplasm be collected which are maintained and improved by publicly funded organisations? Or should users be made to pay for such use? If they are to pay, what should be the basis of compensation? Should the compensation be for individuals or (or communities/institutions to which they belong? Should individual institutions be given the right of patenting their innovations? These are some of the important issues that deserve more attention than they now get and need serious detailed study to evolve reasonably satisfactory, fair and workable solutions. Finally, the tendency to equate the public sector with the government is wrong. The public space is much wider than government departments and includes co- operatives, universities, public trusts and a variety of non-governmental organisations (NGOs). Giving greater autonomy to research organisations from government control and giving non- government public institutions the space and resources to play a larger, more effective role in research, is therefore an issue of direct relevance in restructuring the public research system.Which one of the following statements describes an important issue, or important issues, not being raised in the context of the current debate on IPRs?
 ....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you answer some of the questions.At the heart of what makes India a better regime than China is a healthy respect for the civil rights and liberties of its citizens. There are checks and balances in our government. But India’s new surveillance programme, the Central Monitoring system (CMS), resembles a dystopian society akin to George Orwell’s 1984.According to several news reports, the CMS gives the government, Indian security agencies and income tax (IT) officials the authority to listen to, and tape phone conversions, read emails and text messages, monitor Posts on Facebook, Twitter or Linkedin and track searches on Google of selected targets, without oversight by the courts or parliament. To call it sweeping is an understatement.Typically, Indian Security agencies need a court order for surveillance, or depend on Internet/telephone service providers for data, provided they supply a warrant. CMS allows the government to bypass the court.  Milind Deora, India’s Minister of State for Information Technology says the new system will actually improve citizens’ privacy because telecommunication agencies would no longer be directly involved in the surveillance; only government officials would have these details – missing the point that in a democracy, there has to be freedom from government surveillance. This is hardly comforting in a nation riddled with governmental corruption.India does not have a privacy law. CMS will operate under the Indian Telegraph Act (ITA). The ITA is a relic of the British Raj from 1885, and gives the government the freedom to monitor private conversations. News reports quote anonymous telecommunications ministry officials as saying that CMS has been introduced for security purposes, and “this is to protect you and your country”.That is irrational. For one, there are no ‘security purposes’ that prevent the government from having a rational debate on this programme and getting approval from our elected representatives before authorizing such wide-reaching surveillance. If the government is worried that a public debate in a paralysed parliament would half the programme’s progress, then it can convene a committee of individuals or an individual body such as CAG to oversee the programme. It can seek judicial approval from the Supreme Court, and have a judge sign off on surveillance requests without making these requests public.As of now, the top bureaucrat in the interior ministry and his/her state level deputies will have the power to approve surveillance requests. Even the recently revealed US surveillance Programme, had ‘behind the doors’ bipartisan surveillance approval. Furthermore, US investigation agencies such as the CIA and NSA are not the ruling party’s marionettes; in India, that the CBI is an arm of the government is a fait accompli. Even the Supreme Court recently lambasted the CBI and asked it to guarantee its independence from government influences after it was proved that it shared unreleased investigation reports with the government.There is no guarantee that this top bureaucrat will be judicious or not use this as a tool to pursue political and personal vendettas against opposition parties or open critics of the government. Security purposes hardly justify monitoring an individual’s social media usage. No terrorist announces plans to bomb a building on Facebook. Neither do Maoists espouse Twitter as their preferred form of communication.Presumably, security purposes could be defined as the government’s need to intercept terrorist plans. How does giving the IT department the same sweeping surveillance powers justify security purposes? The IT office already has expansive powers to conduct investigations, summon individuals or company executives, and raid premises to catch tax evaders. In a world where most financial details are discussed and transferred online, allowing the IT departments to snoop on these without any reasonable cause is akin to airport authorities strip searching everyone who boards a flight.What happened on 26/11 or what happens regularly in Naxal – affected areas is extremely sad and should ideally, never take place again. But targeting terrorists means targeting people who show such inclinations, or those who arouse suspicions, either by their travels or heir associations with militant or extremist groups. And in a country where a teenager has been arrested for posting an innocent comment questioning the need for a bandh on the death of a political leader, gives us reason to believe that this law is most likely to be misused, if not abused. Select the word which is MOST OPPOSITE in meaning to the word printed in bold, as used in the passage. AKIN....
MCQ-> Study the following information carefully to answer the given question Ten persons from different companies viz Samsung, Bata, Microsoft, Google, Apple, HCL, ITC, Reliance, Airtel and Vodafone are sitting in two parallel rows containing five people each, in such a way that there is an equal distance between adjacent persons. In row 1- B, C, D, E and F are seated and all of them are facing south. In row-2 R, S, T, U and V are seated and all of them are facing north. Therefore, in the given seating arrangement, each member seated in a row faces another member of the other row. (All the information given above does not the order of seating as in give thefinal arrangement.) • There people sit between R and the person from Apple. The person from Reliance is an immediate neighbour of the one who faces the person from Apple. V sits to the immediate left of the one who faces the person from Reliance. • Only one person sits between V and T. The person from Bata sits second to the right of the one who faces T. F sits second to the left of the person from Google. The person from Google does not sit at an extreme end of the line. • Only two people sit between F and D. The person from Samsung faces an immediate neighbour of D. U is an immediate neighbour of the person from Microsoft. V is not from Microsoft. B sits second to the left of C. • The person from ITC is an immediate neighbour of the person from Vodafone. Neither V nor F is from ITC. The person from ITC faces the person from HCL.F is related to ITC in the same way as T is related to HCL, based on the given arrangement. To who amongst the following is D related to following the same pattern ?
 ....
MCQ-> Directions : Study the following information carefully to answer these questions: Eight persons from different banks viz. UCO Bank, Syndicate Bank, Canara Bank, PNB, Dena Bank, Oriental Bank of Commerce, Indian Bank and Bank of Maharashtra are sitting in two parallel rows containing four people each, in such a way that there is an equal distance between adjacent persons. In row-1 A, B, C and D are seated and all of them are facing South. In row-2 P, Q, R and S are seated and all of them are facing North. Therefore in the given seating arrangement each member seated in a row faces another member of the other row. (All the information given above does not necessarily represent the order of seating as in the final arrangement.) ★ C sits second to right of the person from bank of Maharashtra. R is an immediate neighbour of the person who faces the person from bank of Maharashtra. ★ Only one person sits between R and the person for PNB. Immediate neighbour of the person from PNB faces the person from Canara Bank. ★ The person from UCO Bank faces the person from Oriental Bank of Commerce. R is not from Oriental Bank of Commerce. P is not from PNB. P does not face the person from Bank of Maharashtra. ★ Q faces the person from Dena Bank. The one who faces S sits to the immediate left of A. ★ B does not sit at any of the extreme ends of the line. The person from Bank of Maharashtra does not face the person from Syndicate Bank.Which of the following is true regarding A?
 ....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions