INSIGHTS CURRENT AFFAIRS QUIZ 2022
Quiz-summary
0 of 5 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
Information
The following Quiz is based on the Hindu, PIB and other news sources. It is a current events based quiz. Solving these questions will help retain both concepts and facts relevant to UPSC IAS civil services exam.
To view Solutions, follow these instructions:
-
Click on – ‘Start Quiz’ button
-
Solve Questions
-
Click on ‘Quiz Summary’ button
-
Click on ‘Finish Quiz’ button
-
Now click on ‘View Questions’ button – here you will see solutions and links.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 5 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- Answered
- Review
-
Question 1 of 5
1. Question
1 pointsConsider the following statements regarding cyber security.
- Trojan horses are used to create back-doors so that a hacker can have access to the secure network.
- Unlike viruses, computer worms are malicious programs that copy themselves from system to system, rather than infiltrating legitimate files.
Which of the above statements is/are correct?
Correct
Solution: c)
Malware is defined as a software designed to perform an unwanted illegal act via the computer network. It could be also defined as software with malicious intent.
Malware can be classified based on how they get executed, how they spread, and/or what they do. Some of them are discussed below.
- Virus: A program that can infect other programs by modifying them to include a possible evolved copy of itself.
- Worms: Disseminated through computer networks, unlike viruses, computer worms are malicious programs that copy themselves from system to system, rather than infiltrating legitimate files.
- Trojans: Trojan or trojan horse is a program that generally impairs the security of a system. Trojans are used to create back-doors (a program that allows outside access into a secure network) on computers belonging to a secure network so that a hacker can have access to the secure network.
- Hoax: An e-mail that warns the user of a certain system that is harming the computer. The message thereafter instructs the user to run a procedure (most often in the form of a download) to correct the harming system. When this program is run, it invades the system and deletes an important file.
- Spyware: Invades a computer and, as its name implies, monitors a user’s activities without consent. Spywares are usually forwarded through unsuspecting e-mails with bonafide e-mail i.ds. Spyware continues to infect millions of computers globally.
Incorrect
Solution: c)
Malware is defined as a software designed to perform an unwanted illegal act via the computer network. It could be also defined as software with malicious intent.
Malware can be classified based on how they get executed, how they spread, and/or what they do. Some of them are discussed below.
- Virus: A program that can infect other programs by modifying them to include a possible evolved copy of itself.
- Worms: Disseminated through computer networks, unlike viruses, computer worms are malicious programs that copy themselves from system to system, rather than infiltrating legitimate files.
- Trojans: Trojan or trojan horse is a program that generally impairs the security of a system. Trojans are used to create back-doors (a program that allows outside access into a secure network) on computers belonging to a secure network so that a hacker can have access to the secure network.
- Hoax: An e-mail that warns the user of a certain system that is harming the computer. The message thereafter instructs the user to run a procedure (most often in the form of a download) to correct the harming system. When this program is run, it invades the system and deletes an important file.
- Spyware: Invades a computer and, as its name implies, monitors a user’s activities without consent. Spywares are usually forwarded through unsuspecting e-mails with bonafide e-mail i.ds. Spyware continues to infect millions of computers globally.
-
Question 2 of 5
2. Question
1 pointsConsider the following statements.
- In Indra Sawhney vs Union of India, the Supreme Court held that reservations under Article 16(4) could only be provided at the time of entry into government service but not in matters of promotion.
- In Nagaraj case the Supreme court said that the State is bound to make reservation for the SCs and STs in promotions.
Which of the above statements is/are incorrect?
Correct
Solution: b)
Indra Sawhney vs Union of India and M Nagraj case:
- In its landmark 1992 decision in Indra Sawhney vs Union of India, the Supreme Court had held that reservations under Article 16(4) could only be provided at the time of entry into government service but not in matters of promotion.
- It added that the principle would operate only prospectively and not affect promotions already made and that reservation already provided in promotions shall continue in operation for a period of five years from the date of the judgment. It also ruled that the creamy layer can be and must be excluded.
- On June 17, 1995, Parliament, acting in its constituent capacity, adopted the seventy-seventh amendment by which clause (4A) was inserted into Article 16 to enable reservation to be made in promotion for SCs and STs. The validity of the seventy-seventh and eighty-fifth amendments to the Constitution and of the legislation enacted in pursuance of those amendments was challenged before the Supreme Court in the Nagaraj case.
- Upholding the validity of Article 16 (4A), the court then said that it is an enabling provision. “The State is not bound to make reservation for the SCs and STs in promotions. But, if it seeks to do so, it must collect quantifiable data on three facets — the backwardness of the class; the inadequacy of the representation of that class in public employment; and the general efficiency of service as mandated by Article 335 would not be affected”.
Incorrect
Solution: b)
Indra Sawhney vs Union of India and M Nagraj case:
- In its landmark 1992 decision in Indra Sawhney vs Union of India, the Supreme Court had held that reservations under Article 16(4) could only be provided at the time of entry into government service but not in matters of promotion.
- It added that the principle would operate only prospectively and not affect promotions already made and that reservation already provided in promotions shall continue in operation for a period of five years from the date of the judgment. It also ruled that the creamy layer can be and must be excluded.
- On June 17, 1995, Parliament, acting in its constituent capacity, adopted the seventy-seventh amendment by which clause (4A) was inserted into Article 16 to enable reservation to be made in promotion for SCs and STs. The validity of the seventy-seventh and eighty-fifth amendments to the Constitution and of the legislation enacted in pursuance of those amendments was challenged before the Supreme Court in the Nagaraj case.
- Upholding the validity of Article 16 (4A), the court then said that it is an enabling provision. “The State is not bound to make reservation for the SCs and STs in promotions. But, if it seeks to do so, it must collect quantifiable data on three facets — the backwardness of the class; the inadequacy of the representation of that class in public employment; and the general efficiency of service as mandated by Article 335 would not be affected”.
-
Question 3 of 5
3. Question
1 pointsOperation Searchlight is related to
Correct
Solution: a)
Bangladesh Liberation War began after the Pakistani military junta based in West Pakistan launched Operation Searchlight against the people of East Pakistan on the night of 25 March 1971.
Incorrect
Solution: a)
Bangladesh Liberation War began after the Pakistani military junta based in West Pakistan launched Operation Searchlight against the people of East Pakistan on the night of 25 March 1971.
-
Question 4 of 5
4. Question
1 pointsConsider the following statements regarding United Nations Convention on the Law of the Sea (UNCLOS).
- UNCLOS is a UN specialised agency that defines the rights and responsibilities of nations with respect to their use of the world’s oceans and the management of marine natural resources.
- International Seabed Authority (ISA) and International Tribunal for the Law of the Sea (ITLOS) were established by the UNCLOS.
- International Seabed Authority (ISA) regulate and control all mineral-related activities in the international seabed area beyond the limits of national jurisdiction.
Which of the above statements is/are correct?
Correct
Solution: c)
The United Nations Convention on the Law of the Sea (UNCLOS) defines the rights and responsibilities of nations with respect to their use of the world’s oceans, establishing guidelines for businesses, the environment, and the management of marine natural resources.
International Seabed Authority (ISA) was established to organize, regulate and control all mineral-related activities in the international seabed area beyond the limits of national jurisdiction (referred to as “the Area”), an area underlying most of the world’s oceans. It is an organization established by the United Nations Convention on the Law of the Sea.
The International Tribunal for the Law of the Sea (ITLOS) is an intergovernmental organization created by the mandate of the Third United Nations Conference on the Law of the Sea. It was established by the United Nations Convention on the Law of the Sea.
Incorrect
Solution: c)
The United Nations Convention on the Law of the Sea (UNCLOS) defines the rights and responsibilities of nations with respect to their use of the world’s oceans, establishing guidelines for businesses, the environment, and the management of marine natural resources.
International Seabed Authority (ISA) was established to organize, regulate and control all mineral-related activities in the international seabed area beyond the limits of national jurisdiction (referred to as “the Area”), an area underlying most of the world’s oceans. It is an organization established by the United Nations Convention on the Law of the Sea.
The International Tribunal for the Law of the Sea (ITLOS) is an intergovernmental organization created by the mandate of the Third United Nations Conference on the Law of the Sea. It was established by the United Nations Convention on the Law of the Sea.
-
Question 5 of 5
5. Question
1 pointsConsider the following statements.
- Among all human pathogens, bacteria tend to become most resistant to antibiotics because of their physiology.
- Bacteria have larger number of genes compared to multicellular organisms.
- Bacteria does not exchange resistant genes during sexual reproduction.
Which of the above statements is/are correct?
Correct
Solution: a)
Among all human pathogens, bacteria tend to become most resistant to antibiotics because of their physiology. Since they are unicellular, bacteria have smaller number of genes compared to multicellular organisms. Therefore, even the slightest of changes in their genetic system resulting from exposure to antibiotics alters their pathogenic characteristic.
Moreover, since they reproduce rapidly, an entirely new ‘type’ of antibiotic-resistant bacteria species can evolve from one mutated individual in a very short time. Bacteria also exchange resistant genes during sexual reproduction. This happened in the case of Neisseria gonorrhoeae bacterium becoming resistant to penicillin.
Incorrect
Solution: a)
Among all human pathogens, bacteria tend to become most resistant to antibiotics because of their physiology. Since they are unicellular, bacteria have smaller number of genes compared to multicellular organisms. Therefore, even the slightest of changes in their genetic system resulting from exposure to antibiotics alters their pathogenic characteristic.
Moreover, since they reproduce rapidly, an entirely new ‘type’ of antibiotic-resistant bacteria species can evolve from one mutated individual in a very short time. Bacteria also exchange resistant genes during sexual reproduction. This happened in the case of Neisseria gonorrhoeae bacterium becoming resistant to penicillin.
Join our Official Telegram Channel HERE for Motivation and Fast Updates
Subscribe to our YouTube Channel HERE to watch Motivational and New analysis videos