1. The increased use of groundwater for irrigation purposes has led to





Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->What is the software deployed in Grama Panchayats for accounting purposes?....
QA->Battle of Water Loo (1815) British force led by Duke of Wellington defeated French force led by ?....
QA->During which period of evolution man discovered the use of jute and began to use cloth made of jute?....
QA->Which programme has the objective of providing irrigation through exploitation of ground water to individual and group of beneficiaries of small and marginal farmers belonging to the below poverty line?....
QA->Afterwhich freedom fighter and social reformer Odisha cabinet has named the MegaLift Irrigation Scheme?....
MCQ-> In making decisions about important questions it is desirable to be able to distinguish between ‘strong’ arguments and ‘weak’ arguments ‘Weak’ arguments are those which are of minor importance and also may not be directly related to the question or may be related to a trivial aspect of the question Each question below is followed by three arguments numbered (A) (B) and (C) You have to decide which of the arguments is a ‘strong’ argument and which is a ‘weak’ argumentStatement:should there be a cap on drawing groundwater for irrigation purposes in India ? Arguments: (A)No irrigation is of prime importance for food production in India and it is heavily dependent on groundwater in many parts of the country (B)Yes water tables have gone down to alarmingly low levels in some parts of the country where irrigation is primarily dependent on groundwater which may lead to serious environmental consequences (C)Yes India just cannot afford to draw groundwater any further as the international agencies have cautioned India against it....
MCQ-> In a making decisions about important questions it is desirable to be able to distinguish between ‘strong’ arguments and ‘weak’ arguments. ‘strong’ arguments are those which are both important and directly related to the question ‘Weak’ argument are those which are of minor importance and also may not be directly related to the question or may be related to a trivial aspect of the question Each question below is followed by three arguments numbered (A), (B) and (C).You have to decide which of the argument is a ‘strong’ argument and which is a ‘Weak’ argument.Statement:Should there be a cap on drawing ground water for irrigation purpose in India ? Arguments:(A) No, irrigation is of prime importance for food production in India and it is heavily dependent on groundwater in many parts of the country. (B)Yes, water tables have gone down to alarmingly low levels in some parts of the country where irrigation is primarily dependent on groundwater which may lead to serious environmental consequences (C)Yes India just cannot afford to draw groundwater any further as the international agencies have cautioned India against it....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you answer some of the questions.At the heart of what makes India a better regime than China is a healthy respect for the civil rights and liberties of its citizens. There are checks and balances in our government. But India’s new surveillance programme, the Central Monitoring system (CMS), resembles a dystopian society akin to George Orwell’s 1984.According to several news reports, the CMS gives the government, Indian security agencies and income tax (IT) officials the authority to listen to, and tape phone conversions, read emails and text messages, monitor Posts on Facebook, Twitter or Linkedin and track searches on Google of selected targets, without oversight by the courts or parliament. To call it sweeping is an understatement.Typically, Indian Security agencies need a court order for surveillance, or depend on Internet/telephone service providers for data, provided they supply a warrant. CMS allows the government to bypass the court.  Milind Deora, India’s Minister of State for Information Technology says the new system will actually improve citizens’ privacy because telecommunication agencies would no longer be directly involved in the surveillance; only government officials would have these details – missing the point that in a democracy, there has to be freedom from government surveillance. This is hardly comforting in a nation riddled with governmental corruption.India does not have a privacy law. CMS will operate under the Indian Telegraph Act (ITA). The ITA is a relic of the British Raj from 1885, and gives the government the freedom to monitor private conversations. News reports quote anonymous telecommunications ministry officials as saying that CMS has been introduced for security purposes, and “this is to protect you and your country”.That is irrational. For one, there are no ‘security purposes’ that prevent the government from having a rational debate on this programme and getting approval from our elected representatives before authorizing such wide-reaching surveillance. If the government is worried that a public debate in a paralysed parliament would half the programme’s progress, then it can convene a committee of individuals or an individual body such as CAG to oversee the programme. It can seek judicial approval from the Supreme Court, and have a judge sign off on surveillance requests without making these requests public.As of now, the top bureaucrat in the interior ministry and his/her state level deputies will have the power to approve surveillance requests. Even the recently revealed US surveillance Programme, had ‘behind the doors’ bipartisan surveillance approval. Furthermore, US investigation agencies such as the CIA and NSA are not the ruling party’s marionettes; in India, that the CBI is an arm of the government is a fait accompli. Even the Supreme Court recently lambasted the CBI and asked it to guarantee its independence from government influences after it was proved that it shared unreleased investigation reports with the government.There is no guarantee that this top bureaucrat will be judicious or not use this as a tool to pursue political and personal vendettas against opposition parties or open critics of the government. Security purposes hardly justify monitoring an individual’s social media usage. No terrorist announces plans to bomb a building on Facebook. Neither do Maoists espouse Twitter as their preferred form of communication.Presumably, security purposes could be defined as the government’s need to intercept terrorist plans. How does giving the IT department the same sweeping surveillance powers justify security purposes? The IT office already has expansive powers to conduct investigations, summon individuals or company executives, and raid premises to catch tax evaders. In a world where most financial details are discussed and transferred online, allowing the IT departments to snoop on these without any reasonable cause is akin to airport authorities strip searching everyone who boards a flight.What happened on 26/11 or what happens regularly in Naxal – affected areas is extremely sad and should ideally, never take place again. But targeting terrorists means targeting people who show such inclinations, or those who arouse suspicions, either by their travels or heir associations with militant or extremist groups. And in a country where a teenager has been arrested for posting an innocent comment questioning the need for a bandh on the death of a political leader, gives us reason to believe that this law is most likely to be misused, if not abused. Select the word which is MOST OPPOSITE in meaning to the word printed in bold, as used in the passage. AKIN....
MCQ->The increased use of groundwater for irrigation purposes has led to....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words have been printed in ‘’bold’’ to help you locate them while answering some of the questions.The evolution of Bring Your Own Device (BYOD) trend has been as profound as it has been rapid. It represents the more visible sign that the boundaries between personal life and work life are blurring. The 9 a.m. - 5 p.m. model of working solely from office has become archaic and increasingly people are working extended hours from a range of locations. At the very heart of this evolution is the ability to access enterprise networks from anywhere and anytime. The concept of cloud computing serves effectively to extend the office out of office. The much heralded benefit of BYOD is greater productivity. However, recent research has suggested that this is the greatest myth of BYOD and the reality is that BYOD in practise poses new challenges that may outweigh the benefits. A worldwide commissioned by Fortinet choose to look at attitudes towards BYOD and security from the user’s point of view instead of the IT managers. Specifically the survey was conducted in 15 territories on a group of graduate employees in their early twenties because they represent the first generation to enter the workplace with an expectation of own device use. Moreover, they also represent tomorrow’s influences and decision markers. The survey findings reveals that for financial organizations, the decision to embrace BYOB is extremely dangerous. Larger organizations will have mature IT strategies and policies in place. But what about smaller financial business? They might not have such well developed strategies to protect confidential data. Crucially, within younger employee groups, 55% of the people share an expectation that they should be allowed to use their own devices in the workplace or for work purposes. With this expectation comes the very real risk that employees may consider contravening company policy banning the use of own devices. The threats posed by this level of subversion cannot be overstated. The survey casts doubt on the idea of BYOD leading to greater productivity by revealing the real reason people want to use their own devices. Only 26% of people in this age group cite efficiency as the reason they want to use their own devices, while 63% admit that the main reason is so they have access to their favourite applications. But with personal applications so close to hand, the risks to the business must surely include distraction and time wasting. To support this assumption 46% of people polled acknowledged time wasting as the greatest threat to the organization, while 42% citing greater exposure to theft or loss of confidential data. Clearly, from a user perspective there is great deal of contradiction surroundings BYOB and there exists an undercurrent of selfishness where users expect to use their own devices, but mostly for personal interest. They recognize the risks to the organization but are adamant that those risks are worth talking.According to the passage, for which of the following reasons did Fortinet conduct the survey on a group of graduate employees in their early twenties?A: As this group represents the future decision makers B: As this group represents the first generation who entered the workforce with a better understanding of sophisticated gadgets C: As this group represents the first generation to enter the workplace expecting that they can use their own devices for work purpose....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions