1. P5+1 is a group of six world powers, five of which are permanent members of the United Nations Security Council. Which country represents ‘+1’ in P5+1 ?






Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Show Similar Question And Answers
QA->Name of the alliance among Brazil, Germany, India and Japan for the purpose of supporting each other’s bids for permanent seats on the United Nations Security Council?....
QA->In which country, the United Nations Security Council has approved the first-ever "offensive" UN peace keeping brigade to battle rebels group?....
QA->HOW MANY MEMBERS ARE THERE IN UNITED NATIONS SECURITY COUNCIL....
QA->On October 12 2010, the United Nations General Assembly elected five countries to two-year seats on the Security Council. Name those countries?....
QA->G-4 Nations, which are trying to get permanent berth in UN Security Council, include India,Brazil,Germay and ____....
MCQ-> Since World War II, the nation-state has been regarded with approval by every political system and every ideology. In the name of modernisation in the West, of socialism in the Eastern bloc, and of development in the Third World, it was expected to guarantee the happiness of individuals as citizens and of peoples as societies. However, the state today appears to have broken down in many parts of the world. It has failed to guarantee either security or social justice, and has been unable to prevent either international wars or civil wars. Disturbed by the claims of communities within it, the nation-state tries to repress their demands and to proclaim itself as the only guarantor of security of all. In the name of national unity, territorial integrity, equality of all its citizens and non-partisan secularism, the state can use its powerful resources to reject the demands of the communities; it may even go so far as genocide to ensure that order prevails.As one observes the awakening of communities in different parts of the world, one cannot ignore the context in which identity issues arise. It is no longer a context of sealed frontiers and isolated regions but is one of integrated global systems. In a reaction to this trend towards globalisation, individuals and communities everywhere are voicing their desire to exist, to use their power of creation and to play an active part in national and international life.There are two ways in which the current upsurge in demands for the recognition of identities can be looked at. On the positive side, the efforts by certain population groups to assert their identity can be regarded as "liberation movements", challenging oppression and injustice. What these groups are doing - proclaiming that they are different, rediscovering the roots of their culture or strengthening group solidarity - may accordingly be seen as legitimate attempts to escape from their state of subjugation and enjoy a certain measure of dignity. On the downside, however, militant action for recognition tends to make such groups more deeply entrenched in their attitude and to make their cultural compartments even more watertight. The assertion of identity then starts turning into self-absorption and isolation, and is liable to slide into intolerance of others and towards ideas of "ethnic cleansing", xenophobia and violence.Whereas continuous variations among peoples prevent drawing of clear dividing lines between the groups, those militating for recognition of their group's identity arbitrarily choose a limited number of criteria such as religion, language, skin colour, and place of origin so that their members recognise themselves primarily in terms of the labels attached to the group whose existence is being asserted. This distinction between the group in question and other groups is established by simplifying the feature selected. Simplification also works by transforming groups into essences, abstractions endowed with the capacity to remain unchanged through time. In some cases, people actually act as though the group has remained unchanged and talk, for example, about the history of nations and communities as if these entities survived for centuries without changing, with the same ways of acting and thinking, the same desires, anxieties, and aspirations. Paradoxically, precisely because identity represents a simplifying fiction, creating uniform groups out of disparate people, that identity performs a cognitive function. It enables us to put names to ourselves and others, form some idea of who we are and who others are, and ascertain the place we occupy along with the others in the world and society. The current upsurge to assert the identity of groups can thus be partly explained by the cognitive function performed by identity. However, that said, people would not go along as they do, often in large numbers, with the propositions put to them, in spite of the sacrifices they entail, if there was not a very strong feeling of need for identity, a need to take stock of things and know "who we are", "where we come from", and "where we are going".Identity is thus a necessity in a constantly changing world, but it can also be a potent source of' violence and disruption. How can these two contradictory aspects of identity be reconciled? First, we must bear the arbitrary nature of identity categories in mind, not with a view to eliminating all forms of identification—which would be unrealistic since identity is a cognitive necessity—but simply to remind ourselves that each of us has several identities at the same time. Second, since tears of nostalgia are being shed over the past, we recognise that culture is constantly being recreated by cobbling together fresh and original elements and counter-cultures. There are in our own country a large number of syncretic cults wherein modern elements are blended with traditional values or people of different communities venerate saints or divinities of particular faiths. Such cults and movements are characterised by a continual inflow and outflow of members which prevent them from taking on a self-perpetuating existence of their own and hold out hope for the future, indeed, perhaps for the only possible future. Finally, the nation-state must respond to the identity urges of its constituent communities and to their legitimate quest for security and social justice. It must do so by inventing what the French philosopher and sociologist, Raymond Aron, called "peace through law". That would guarantee justice both to the state as a whole and its parts, and respect the claims of both reason and emotions. The problem is one of reconciling nationalist demands with the exercise of democracy.According to the author, happiness of individuals was expected to be guaranteed in the name of:
 ....
MCQ-> on the basis of the information given in the following case. Teknik Group of industries had businesses in different sectors ranging from manufacturing, construction, fish farming and hotels. These different businesses operated as semi-independent units managed by the unit level managers. Teknik’s management had an internal consultancy group called as Business Advisory Group (known internally as BAG). The 15 experts in BAG were hired personally by Mr. Teknikwala, the owner of Teknik, who wanted this core group of experts to help his organization grow fast without facing the typical growth hurdles. Most of them were specialists in fields like law, information technology, human resource management, and operations management. Almost all of them had experience spanning decades in the industry. Whenever any of the units faced any significant all units and it represented an extra work for those who were involved. This coordination was required to understand the different work processes and the users’ requirements. This coordination activity was being extensively managed by the old timers as they were familiar with internal processes and people in the different units. An external consultant was also hired for customization and implementation After two months, BAG teams had to fortnightly present their progress to Ms. Teknikwali’s team. In the last meeting Ms. Teknikwali was dissatisfied. She explained her thinking that since ERP impacted every aspect of the business, the roll out had to be done faster. She wanted Mr. Shiv to get the implementation completed ahead of schedule. In the meeting she asked Mr. Shiv to get the people in IT team to be more productive. Not willing to disagree, Mr. Shiv committed to a roll-out schedule of complete ERP system in 6 months instead of earlier decided 14 months. Next day, Mr. Shiv presented the revised project milestone to BAG members. He told them that in order to meet the deadline, the members were expected to work on week-ends till the completion of the project. Along with that, they were also expected to maintain their earlier standards of delivery time and quality for the normal trouble-shooting and internal advisory work. Mr. Shiv also pointed out that anyone whose performance did not meet the expectations would be subjected to formal disciplinary action. The meeting ended without any member commenting on Shiv’s ideas, although Mr. Shiv heard a lot of mumbling in the corridor. Over the week, Shiv noticed that the members seemed to avoid him and he had to make extra effort to get ideas from them. After a fortnight Shiv reviewed the attendance register and found the Mr. Lal, an old time member, had not come during the week-ends and certain decisions were held up due to lack of inputs from Mr. Lal. Mr. Shiv issued a written reprimand to Mr. Lal. He was speechless on receiving the reprimand but kept silent. It has been three days since that incident. Some of the senior members had put in request for transfer to other business units. It was rumoured that four problems, the unit level managers would put up a request for help to BAG. The problems ranged from installation of internal MIS systems, to financial advice related to leasing of equipment, to handling of employee grievances. Over a period of 20 years, Teknik’s revenues grew from 100 crore 10,000 crore with guidance of BAG and due to Mr. Tekinwala’s vision. Given its reputation in the industry, many people wanted to start their careers in BAG. Often young MBAs fresh out of business schools would apply. However their applications used to be rejected by Mr. Teknikwala, who had a preference for people with extensive industry experience. Things changed after the unfortunate demise of Mr. Teknikwala. His daughter Miss. Teknikwali took up the family business. She was an MBA from one of the premier business schools, and was working in a different company when Mr. Tekinwala passed away. She preferred that BAG developed new ideas and therefore inducted freshly graduated MBAs from premier business schools. She personally supervised the recruitment and selection process. Now the entire group constituted of 50 specialists, out of which 35 were the old time members. She also changed the reporting relationships in the BAG group with some of the older members being made to report to the new members. In IT team, Mr. Shiv, a newly recruited MBA, was made in-charge. For the older members it was a shock. However, as most of them were on the verge of retirement, and it would be challenging to search for new jobs while competing with younger professionals, they decided to play along. After one month, all business units were caught up in the ERP fever. This was an idea pushed by Ms. Teknikwali who the need the need to replace the old legacy systems with latest ERP system integrating all the units of Teknik. This was heavily influenced by her experience in the previous where an ERP system was already up and running. Therefore she was not aware of the difference between installing an ERP system and working on an already installed one. The ERP mplementation in Teknik Group required extensive coordination with senior level managers of senior legal experts had agreed to an offer from a law firm. Other senior members would sporadically come in late to work, citing health reasons. Almost all senior members now wanted a weekly work-routine to be prepared and given to them in advance so that they could deliver as per the schedule. This insistence on written communication was a problem as urgent problems or ad-hoc requests could not be foreseen and included. Also normal services to other business units were being unattended to, and there were complaints coming from the unit heads.Which of the following could have been a better response of Mr. Shiv to Ms. Teknikwali’s request to re-schedule the ERP implementation?....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you answer some of the questions.At the heart of what makes India a better regime than China is a healthy respect for the civil rights and liberties of its citizens. There are checks and balances in our government. But India’s new surveillance programme, the Central Monitoring system (CMS), resembles a dystopian society akin to George Orwell’s 1984.According to several news reports, the CMS gives the government, Indian security agencies and income tax (IT) officials the authority to listen to, and tape phone conversions, read emails and text messages, monitor Posts on Facebook, Twitter or Linkedin and track searches on Google of selected targets, without oversight by the courts or parliament. To call it sweeping is an understatement.Typically, Indian Security agencies need a court order for surveillance, or depend on Internet/telephone service providers for data, provided they supply a warrant. CMS allows the government to bypass the court.  Milind Deora, India’s Minister of State for Information Technology says the new system will actually improve citizens’ privacy because telecommunication agencies would no longer be directly involved in the surveillance; only government officials would have these details – missing the point that in a democracy, there has to be freedom from government surveillance. This is hardly comforting in a nation riddled with governmental corruption.India does not have a privacy law. CMS will operate under the Indian Telegraph Act (ITA). The ITA is a relic of the British Raj from 1885, and gives the government the freedom to monitor private conversations. News reports quote anonymous telecommunications ministry officials as saying that CMS has been introduced for security purposes, and “this is to protect you and your country”.That is irrational. For one, there are no ‘security purposes’ that prevent the government from having a rational debate on this programme and getting approval from our elected representatives before authorizing such wide-reaching surveillance. If the government is worried that a public debate in a paralysed parliament would half the programme’s progress, then it can convene a committee of individuals or an individual body such as CAG to oversee the programme. It can seek judicial approval from the Supreme Court, and have a judge sign off on surveillance requests without making these requests public.As of now, the top bureaucrat in the interior ministry and his/her state level deputies will have the power to approve surveillance requests. Even the recently revealed US surveillance Programme, had ‘behind the doors’ bipartisan surveillance approval. Furthermore, US investigation agencies such as the CIA and NSA are not the ruling party’s marionettes; in India, that the CBI is an arm of the government is a fait accompli. Even the Supreme Court recently lambasted the CBI and asked it to guarantee its independence from government influences after it was proved that it shared unreleased investigation reports with the government.There is no guarantee that this top bureaucrat will be judicious or not use this as a tool to pursue political and personal vendettas against opposition parties or open critics of the government. Security purposes hardly justify monitoring an individual’s social media usage. No terrorist announces plans to bomb a building on Facebook. Neither do Maoists espouse Twitter as their preferred form of communication.Presumably, security purposes could be defined as the government’s need to intercept terrorist plans. How does giving the IT department the same sweeping surveillance powers justify security purposes? The IT office already has expansive powers to conduct investigations, summon individuals or company executives, and raid premises to catch tax evaders. In a world where most financial details are discussed and transferred online, allowing the IT departments to snoop on these without any reasonable cause is akin to airport authorities strip searching everyone who boards a flight.What happened on 26/11 or what happens regularly in Naxal – affected areas is extremely sad and should ideally, never take place again. But targeting terrorists means targeting people who show such inclinations, or those who arouse suspicions, either by their travels or heir associations with militant or extremist groups. And in a country where a teenager has been arrested for posting an innocent comment questioning the need for a bandh on the death of a political leader, gives us reason to believe that this law is most likely to be misused, if not abused. Select the word which is MOST OPPOSITE in meaning to the word printed in bold, as used in the passage. AKIN....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ....
MCQ->P5+1 is a group of six world powers, five of which are permanent members of the United Nations Security Council. Which country represents ‘+1’ in P5+1 ?....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions