Description : Short form of International Covenant on Civil and Political Rights is a. ICPR. b. ICCPR. c. Both A & B. d. None of these.
Last Answer : b. ICCPR.
Description : The three documents - UDHR, ICCPR and ICESCR along with two optional protocols to the ICCPR constitutes - (a) International Humanitarian Law (b) The Commission of Human Rights (c) The International Bill of Human Rights (d) Developmental Rights
Last Answer : (c) The International Bill of Human Rights
Description : Protection of life and liberty of Indian Citizen is secured by: a) Article 17 b) Article 21 c) Article 25 d) Article 29
Last Answer : b) Article 21
Description : Article 21 of the Fundamental Rights deals with which subject— (A) Protection of certain rights regarding freedom of speech, (B) Protection in respect of conviction of offence (C) Protection against arrest and detention in certain cases (D) Protection of life and personal liberty
Last Answer : (D) Protection of life and personal liberty
Description : Article 20 of the Fundamental Rights represents which subject— (A) Equality of opportunity in matters of public employment (B) Protection in respect of Conviction of Offence (C) Protection of life and personal liberty (D) None of the above
Last Answer : (B) Protection in respect of Conviction of Offence
Description : In Indian Constitution fundamental rights are contained: a) Article 12 to 35 b) Article 40 to 52 c) Article 64 to 75 d) None of these
Last Answer : a) Article 12 to 35
Description : Who believed that right to life, liberty and property is natural rights? (a) Aristotle (b) Rousseau (c) Karl Marx (d) John Locke
Last Answer : (d) John Locke
Description : Right to Privacy is protected as an intrinsic part of Right to Life and Personal Liberty. Which of the following in the Constitution of India correctly and appropriately imply the above statement? (1) ... in Part. III (4) Article 24 and the provisions under the 44th Amendment to the Constitution
Last Answer : (3) Article 21 and the freedoms guaranteed in Part. III Explanation: The Supreme Court ruled that "the right to privacy is protected as an intrinsic part of the right to life and personal ... the Janata Government mainly to nullify some of the amendments made by the 42nd Amendment Act, 1976.
Description : Parliament enjoys the exclusive right to legislate on the subjects contained in— (A) The Union List (B) The Concurrent List (C) The State List (D) Both (A) and (B)
Last Answer : (A) The Union List
Description : The Declaration of Independence of the United States lists life, liberty, and the pursuit of happiness as............ (a) Legal Rights (b) Fundamental Rights (c) Natural Rights (d) None of these
Last Answer : (c) Natural Rights
Description : The Convention on the Rights of Child, 1989, classified child rights into four categories – (a) Life, Liberty, Equality and Fraternity (b) Civil, Political, Economic and Cultural Rights (c) Survival, Development, Protection and Participation Rights (d) None of these
Last Answer : (c) Survival, Development, Protection and Participation Rights
Description : Indian constitution provides protection to the life and liberty of citizens as well as non citizens by a) Art. 20 b) Art. 21 c) Art. 22 d) Art. 19
Last Answer : b) Art. 21
Description : The Protection of Human Rights Act 1993 describes‘Human Rights’as relating to a. Liberty. b. Equality. c. Dignity. d. All of these.
Last Answer : d. All of these.
Description : Liberty, Equality and Fraternity are slogans of – (a) American Revolution (b) Russian Revolution (c) French Revolution (d) Glorious Revolution
Last Answer : (c) French Revolution
Description : What is the name for direct computer to computer transfer of transaction information contained in business document? a) Internet commerce b) E-commerce c) Transaction information transfer d) Electronic data interchange
Last Answer : d) Electronic data interchange
Description : What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents? a. internet commerce b. e-commerce c.transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : The fundamental Duties of Indian Citizens are contained in – a) Part -i b) Part-ii c) Part- iii d) Part-iv of the constitution
Last Answer : d) Part-iv of the constitution
Description : Right to Privacy is included in which article of Indian constitutions? a. Article 21 b. Article 12 c. Article 15 d. Article 25
Last Answer : a. Article 21
Description : Which Article of the 1973 Constitution provides that no personal shall be deprived of life or liberty save in accordance with law? A. Article 6 B. Article 8 C. Article 9 D. Article 10
Last Answer : ANSWER: C
Description : Right to the enjoyment of pollution free water as interpreted by the Supreme Court in Subhas Kumar Vs. State of Bihar (1991) falls under - (1) Right to Equality (2) Right to Liberty (3) Right against Exploitation (4) Right to Life and Personal liberty
Last Answer : (4) Right to Life and Personal liberty Explanation: Right to life and personal liberty is Article 21 of Fundamental rights. Without this right, for an individual to enjoy other fundamental rights become meaningless.
Description : Which of the following marketing techniques are most likely to pay you? a. Pay per click advertising b. Using social media marketing strategies c. posting press release d. article marketing
Last Answer : d. article marketing
Description : Which article of Indian Constitution provides for prevention of bonded labour? a) Article 19 b) Article 21 c) Article 23 d) Article 25
Last Answer : c) Article 23
Description : Protection and improvement of environment is ensured in: a) Article 29 b) Article 32 c) Article 45 d) Article 48
Last Answer : d) Article 48
Description : The Constitution of India guarantees to all Indian women equality by a. Article 21. b. Article 9. c. Article 14. d. Article 8.
Last Answer : c. Article 14.
Description : In Article 39 Constitution guarantees [A] Equal rights for men and women [B] Equal pay for equal work for men and women [C] Equal property rights [D] None of the above
Last Answer : [B] Equal pay for equal work for men and women
Description : In which article of the Constitution of India has the Joint Sitting of the Lok Sabha and the Rajya Sabha been provided? (A) Article 101 (B) Article 108 (C) Article 133 (D) Article 102
Last Answer : (B) Article 108
Description : Which Article of the Indian Constitution empowers a High Court to issue writs? a.Art342 b.Art366 c.Art226 d.Art358
Last Answer : c.Art226
Description : Which article of Indian constitution deals with Constitutional Amendments? (a) Article 332 (b) Article 386 (c) Article 368 (d) None of the above
Last Answer : (c) Article 368
Description : Which Article is related to Equality before law? (a) Art. 13 (b) Art. 14 (c) Art. 15 (d) Art. 16
Last Answer : (b) Art. 14
Description : In which article of the Indian constitution explained the Money Bill? (i) Article 109 (ii) Article 110 (iii) Article 111 (iv) None of the above
Last Answer : (i) Article 109
Description : The fundamental duties of the Indian citizens was taken from the article of - (i) Part IV (A) (ii) Part IV (B) (iii) Part V (A) (iv) Part V (B)
Last Answer : (i) Part IV (A)
Description : The definition of Money bill is provided in which article of the Indian Constitution- a) Article 10 b) Article -19 c) Article 110 d)Article-111
Last Answer : c) Article 110
Description : Which Article mentioned that the Supreme Court of india is the highest Judicial authority of the Nation a) Art-121 b) Art-122 c) Art-123 d) Art-124
Last Answer : d) Art-124
Description : Which article of the constitution prohibits the employment of children bellow 14 years of age in any factory ,mine or other hazardous job- a) Art-14 b) Art-19 c) Art-24 d) Art-29
Last Answer : c) Art-24
Description : A STORY WHICH TAKES AN IN DEPTH LOOK AT THE SUBJECT IS CALLED....... a) Editorial b) Article c) Feature d) News
Last Answer : c) Feature
Description : No liability is also accepted for the loss of registered articles in the following cases a) In circumstanced beyond the control. b) When disposal of the article cannot be traced due to destruction of records in ... by post d) When sender has not made complaint within one year. e) All of the above
Last Answer : e) All of the above
Description : Whoever, being an officer of the post office, commits theft in respect of or dishonestly misappropriates, or for any purpose whatsoever, secretes, destroys or throws away, any postal article in course of ... which may extend to seven years, and shall also be punishable with fine d) None of these
Last Answer : c) Punishable with imprisonment for a term which may extend to seven years, and shall also be punishable with fine
Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption
Last Answer : d. encryption
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption
Last Answer : a. digital wallet
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above
Last Answer : d. all the above
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above
Description : The main thrust of ‘Copenhegen Summit’ was: a) Food Security b) Air Pollution c) Rehabilitation d) Climate Change
Last Answer : d) Climate Change
Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above
Last Answer : [D] All of the above
Description : n processes, access control implements a a)Security Policy b)Access Policy c)Control Policy d)Check Policy
Last Answer : a)Security Policy
Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access
Last Answer : c)Hacker or Cracker
Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v
Last Answer : c) i, ii, iii and v only