NEXT to GRAND HOTEL, DHANGU ROAD,PATHANKOT MOB: 9646598579, 9988732416, Website

Total Page:16

File Type:pdf, Size:1020Kb

NEXT to GRAND HOTEL, DHANGU ROAD,PATHANKOT MOB: 9646598579, 9988732416, Website 1.Who among the following has been appointed as Director General Naval Operations? A. Admiral MA Hampiholi B. Admiral Robin K. Dhowan C. Admiral Pradeep Kumar Chatterjee D. Admiral Vishnu Bhagwat 2. First Indian Army Mountaineering Expedition held in which Mountain? A. Mt Kamet B. Mt Kangchenjunga C. Mt Makalu D. Mt Nanda Devi 3. Worlds longest salt cave found in __________. A. India B. Japan C. Israel D. Thailand 4. Recently, N.K. Singh launched the book "Indian Fiscal Federalism". Who is the author of the book? A. Viral Acharya B. Yaga Venugopal Reddy C. Bimal Jalan D. Arvind Subramanian 5. Tashigang become the highest polling station in the world. It belongs to which Indian state? A. Karnataka B. Arunachal Pradesh C. Haryana D. Himachal Pradesh 6. Which IIT have developed AI based disease detector? A. IIT-Hyderabad B. IIT-Madras C. IIT-Delhi D. IIT-Mumbai 7. Who has been conferred with the prestigious Bodley Medal by the University of Oxford's world-famous Bodleian Libraries? A. Joseph Stiglitz B. Jean-Paul Fitoussi C. Amartya Sen D. Martha Nussbaum 8. How many members were newly-appointed for anti-corruption ombudsman Lokpal? A. 6 B. 8 C. 4 D. 7 9. Who has been appointed as the Flag Officer Commanding Maharashtra Naval Area? A. Admiral Sureesh Mehta B. Admiral Rajesh Pendharkar C. Admiral Arun Prakash D. Admiral Vishnu Bhagwat 10. ICICI Prudential Mutual Fund launched ICICI Prudential Bharat Consumption Scheme to get advantage from the Indian consumption market. The minimum investment of this scheme is; A. Rs 2,000 B. Rs 35000 C. Rs 4,000 D. Rs 5,000 11. The researchers of this IIT has analysed that urban areas are cooler than non-urban areas during heat waves. A. IIt-Indore B. IIT-Gandhinagar C. IIT-Guwahati D. IIT-Kanpur 1 BRILLIANT ACADEMY, NANDA COMPLEX (BASEMENT) NEXT TO GRAND HOTEL, DHANGU ROAD,PATHANKOT MOB: 9646598579, 9988732416, Website: www.thebrilliantacademy.co.in 12. Which of the following became first Indian port operator to record 200 million tonnes cargo movement in 2018- 19? A. Mundra Port B. Paradip Port C. Mercator Limited D. Adani Ports and Special Economic Zone 13. Who won 2018 Turing Award, the Nobel Prize of computing along with Yoshua Bengio, and Yann LeCun? A. Geoffrey Hinton B. John L. Hennessy C. Whitfield Diffie D. David A. Patterson 14. India becomes the 4th country to test Anti-satellite missile system named __________. A. Mission Rohini B. Mission Bhaskara C. Mission Shakti D. Mission OceanSat 15. Who was awarded as the 'Best Sports Federation' award in the country by the Association Chambers of Commerce and Industry? A. All India Tennis Association B. Netaji Subhas National Institute of Sports C. Indian Olympic Association D. National Rifle Association of India 16. What is the following is the first Indian Ship between India and Bangladesh? A. Goa Bengal B. Chilika Bengal C. Brahmaputra Bengal D. R V Bengal Ganga 17. Who was re-elected as the President of Comoros? A. Azali Assoumani B. Mahamadou Ahamada C. Ikililou Dhoinine D. Ahmed Abdallah 18. According to the Skytrax World Airport Awards, which airport has been crowned the world's best aviation hub? A. Incheon International Airport B. Singapore's Changi Airport C. Tokyo International Airport D. Indira Gandhi International Airport 19. Who has been appointed as Special Central Police Observer for the States of West Bengal and Jharkhand by the Election Commission of India? A. Sh K K Sharma B. Sh Mrinal Kanti Das C. Sh Vivek Dubey D. Sh Mohnish Chawla 1 BRILLIANT ACADEMY, NANDA COMPLEX (BASEMENT) NEXT TO GRAND HOTEL, DHANGU ROAD,PATHANKOT MOB: 9646598579, 9988732416, Website: www.thebrilliantacademy.co.in .
Recommended publications
  • Volume Xlv, No. 3 September, 1999 the Journal of Parliamentary Information
    VOLUME XLV, NO. 3 SEPTEMBER, 1999 THE JOURNAL OF PARLIAMENTARY INFORMATION VOL. XLV NO.3 SEPTEMBER 1999 CONTENTS PAGE EDITORIAL NOTE 281 SHORT NOTES The Thirteenth Lok Sabha; Another Commitment to Democratic Values -LARRDIS 285 The Election of the Speaker of the Thirteenth Lok Sabha -LARRDIS 291 The Election of the Deputy Speaker of the Thirteenth Lok Sabha -LARRDIS 299 Dr. (Smt.) Najma Heptulla-the First Woman President of the Inter-Parliamentary Union -LARRDIS 308 Parliamentary Committee System in Bangladesh -LARRDIS 317 Summary of the Report of the Ethics Committee, Andhra Pradesh Legislative Assembly on Code of Conduct for Legislators in and outside the Legislature 324 PARLIAMENTARY EVENTS AND ACTIVITIES Conferences and Symposia 334 Birth Anniversaries of National Leaders 336 Indian Parliamentary Delegations Going Abroad 337 Bureau of Parliamentary Studies and Training 337 PARLIAMENTARY AND CONSTITUTIONAL DEVELOPMENTS 339 SESSIONAl REVIEW State Legislatures 348 SUMMARIES OF BooKS Mahajan, Gurpreet, Identities and Rights-Aspects of Liberal Democracy in India 351 Khanna, S.K., Crisis of Indian Democracy 354 RECENT LITERATURE OF PARLIAMENTARY INTEREST 358 ApPENDICES I. Statement showing the work transacted during the Fourth Session of the Twelfth lok Sabha 372 II. Statement showing the work transacted during the One Hundred and Eighty-sixth Session of the Rajya Sabha 375 III. Statement showing the activities of the legislatures of the States and the Union territories during the period 1 April to 30 June 1999 380 IV. List of Bills passed by the Houses of Parliament and assented to by the President during the period 1 April to 30 June 1999 388 V.
    [Show full text]
  • Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
    Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today.
    [Show full text]
  • The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories
    The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through the company that Ronald Rivest, Adi Shamir and Leonard Adleman started in 1982 to commercialize the RSA encryption algorithm that they had invented. At the time, Kaliski had just started his undergraduate degree at MIT. Professor Rivest was the advisor of his bachelor’s, master’s and doctoral theses, all of which were about cryptography. When Kaliski finished his graduate work, Rivest asked him to consider joining the company, then called RSA Data Security. In 1989, he became employed as the company’s first full-time scientist. He is currently chief scientist at RSA Laboratories and vice president of research for RSA Security. Introduction Number theory may be one of the “purest” branches of mathematics, but it has turned out to be one of the most useful when it comes to computer security. For instance, number theory helps to protect sensitive data such as credit card numbers when you shop online. This is the result of some remarkable mathematics research from the 1970s that is now being applied worldwide. Sensitive data exchanged between a user and a Web site needs to be encrypted to prevent it from being disclosed to or modified by unauthorized parties. The encryption must be done in such a way that decryption is only possible with knowledge of a secret decryption key. The decryption key should only be known by authorized parties. In traditional cryptography, such as was available prior to the 1970s, the encryption and decryption operations are performed with the same key.
    [Show full text]
  • The Greatest Pioneers in Computer Science
    The Greatest Pioneers in Computer Science Ivan Srba, Veronika Gondová 19th October 2017 5th Heidelberg Laureate Forum 2 Laureates of mathematics and computer science meet the next generation September 24–29, 2017, Heidelberg https://www.heidelberg-laureate-forum.org 3 Awards in Computer Science 4 Awards in Computer Science 5 • ACM A.M. Turing Award • “Nobel Prize of Computing” • Awarded to “an individual selected for contributions of a technical nature made to the computing community” • Accompanied by a prize of $1 million Awards in Computer Science 6 • ACM A.M. Turing Award • “Nobel Prize of Computing” • Awarded to “an individual selected for contributions of a technical nature made to the computing community” • Accompanied by a prize of $1 million • ACM Prize in Computing • Awarded to “an early to mid-career fundamental innovative contribution in computing” • Accompanied by a prize of $250,000 Some of Laureates We Met at 5th HLF 7 PeWe Postcard 8 Leslie Lamport 9 ACM A.M. Turing Award (2013) Source: https://www.heidelberg-laureate-forum.org/blog/laureate/leslie-lamport/ Leslie Lamport 10 ACM A.M. Turing Award (2013) “for fundamental contributions to the theory and practice of distributed and concurrent systems, notably the invention of concepts such as causality and logical clocks, safety and liveness, replicated state machines, and sequential consistency.” • Developed Lamport Clocks for distributed systems • The paper “Time, Clocks, and the Ordering of Events in a Distributed System” from 1978 has become one of the most cited works in computer science • Developed LaTeX • Invented the first digital signature algorithm • Currently work in Microsoft Research Source: https://www.heidelberg-laureate-forum.org/blog/laureate/leslie-lamport/ Balmer’s Peak 11 • The theory that computer programmers obtain quasi-magical, superhuman coding ability • when they have a blood alcohol concentration percentage between 0.129% and 0.138%.
    [Show full text]
  • Indian Forces (Defence) – May 2019
    Indian Forces (Defence) India's military spending up by 3.1% in 2018 Worldwide, military expenditure rose by 2.6% from 2017 to reach $1.8 trillion in 2018, according to SIPRI data. India's spending rose by 3.1%, while Pakistan's military spending rose by 11%. The five biggest spenders were the U.S., China, Saudi Arabia, India and France. IAF carries out first-of-its-kind operation ‘eastern neighbour The Indian Air Force has focussed on air defence preparedness in the eastern and north-eastern sector with an eye on the country’s ‘eastern neighbour'. IAF carried out a drill of its Sukhoi Su-30 jets from the civilian airport on the outskirts of Guwahati. It was the first-of-its-kind operation, also conducted in Kolkata and Durgapur in West Bengal. Launch of Fourth Scorpene Class Submarine - VELA Vela, the fourth Scorpene class submarine being constructed by Mazagon Dock Shipbuilders Limited for the Indian Navy, was launched. This event reaffirms the steps taken by MDL in the ongoing ‘Make In India’ programme, which is being actively implemented by the Department of Defence Production (MoD). INS Ranjit gets decommissioned upon completion of 36 years INS Ranjit, a Rajput class destroyer was decommissioned at a solemn yet grand ceremony at Naval Dockyard, Visakhapatnam culminating a glorious era on 06 May 19.The ship commissioned on 15 September 1983 by Captain Vishnu Bhagwat in erstwhile USSR has rendered yeoman service to the nation for 36 years. DRDO Successfully Conducts Flight Test of ABHYAS Indian Forces (Defence) – May 2019 Defence Research and Development Organisation (DRDO) conducted successful flight test of ABHYAS - High-speed Expendable Aerial Target (HEAT) from Interim Test Range, Chandipur in Odisha.
    [Show full text]
  • Arxiv:2106.11534V1 [Cs.DL] 22 Jun 2021 2 Nanjing University of Science and Technology, Nanjing, China 3 University of Southampton, Southampton, U.K
    Noname manuscript No. (will be inserted by the editor) Turing Award elites revisited: patterns of productivity, collaboration, authorship and impact Yinyu Jin1 · Sha Yuan1∗ · Zhou Shao2, 4 · Wendy Hall3 · Jie Tang4 Received: date / Accepted: date Abstract The Turing Award is recognized as the most influential and presti- gious award in the field of computer science(CS). With the rise of the science of science (SciSci), a large amount of bibliographic data has been analyzed in an attempt to understand the hidden mechanism of scientific evolution. These include the analysis of the Nobel Prize, including physics, chemistry, medicine, etc. In this article, we extract and analyze the data of 72 Turing Award lau- reates from the complete bibliographic data, fill the gap in the lack of Turing Award analysis, and discover the development characteristics of computer sci- ence as an independent discipline. First, we show most Turing Award laureates have long-term and high-quality educational backgrounds, and more than 61% of them have a degree in mathematics, which indicates that mathematics has played a significant role in the development of computer science. Secondly, the data shows that not all scholars have high productivity and high h-index; that is, the number of publications and h-index is not the leading indicator for evaluating the Turing Award. Third, the average age of awardees has increased from 40 to around 70 in recent years. This may be because new breakthroughs take longer, and some new technologies need time to prove their influence. Besides, we have also found that in the past ten years, international collabo- ration has experienced explosive growth, showing a new paradigm in the form of collaboration.
    [Show full text]
  • IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), Volumeinternational 4, Issue 6, November - December JOURNAL (2013) of MANAGEMENT (IJM)
    International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), VolumeINTERNATIONAL 4, Issue 6, November - December JOURNAL (2013) OF MANAGEMENT (IJM) ISSN 0976-6502 (Print) ISSN 0976-6510 (Online) IJM Volume 4, Issue 6, November - December (2013), pp. 209-212 © IAEME: www.iaeme.com/ijm.asp © I A E M E Journal Impact Factor (2013): 6.9071 (Calculated by GISI) www.jifactor.com DISTINGUISH FROM SYMMETRIC AND ASYMMETRIC CRYPTO SYSTEMS. CITE THE STRENGTHS AND SHORTCOMINGS OF THE EACH SYSTEM V. Sridevi 1, V. Sumathi 2 and M. Guru Prasad 3 1Department of Biotechnology, Sri Venkateswara University, Tirupati, A.P 2Department of Biotechnology, Sri Padmavati Mahila Visvavidyalayam, Tirupati, A.P. 3Department of Biochemistry, Bharatiyar University, Coimbatore, Chennai. ABSTRACT In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key exchange make them difficult to use. In an asymmetric cipher, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is shared publicly. The second key, the private key, should never be shared with anyone.When you send a message using asymmetric cryptography, you encrypt the message using the recipients public key. The recipient then decrypts the message using his private key. That is why the system is called asymmetric.
    [Show full text]
  • Defence, Science & Technology Current Affairs
    www.gradeup.co Defence, Science & Technology Current Affairs 1. Tech Mahindra announced its biggest defence order worth over Rs 300 crore with the Indian Navy. Note: As part of the ‘Armed Forces Secure Access Card’ (AFSAC) Project, Tech Mahindra will implement RFID (Radio Frequency Identification) based Access Control System across all naval bases and ships. The new AFSAC Card will replace the existing paper-based Identity Card for all Navy personnel including dependents and ex-servicemen. Using the CMMI (Capability Maturity Model Integration) level 5 processes, Tech Mahindra will develop a secure application to manage the access control devices, network devices and the AFSAC Card through a data centre. 2. Vice Admiral Karambir Singh (Commander-in-Chief of the Eastern Naval Command) has taken over as the 24th Navy Chief. Note: Navy Chief Admiral Sunil Lanba has retired on completion of his tenure. During his tenure as the Chief of Naval Staff, Admiral Lanba set the tone for several transitions in operational, training and organizational philosophy of the Indian Navy. 1. Kolkata-based defence shipyard signed an Rs. 6,311-crore contract with the Defence Ministry to build eight anti-submarine warfare shallow watercraft for the Indian Navy – Garden Reach Shipbuilders & Engineers. Note: The first vessel will be delivered within 42 months from the contract (by October 2022).The ASWSWCs are equipped with sophisticated sonar, with an algorithm that differentiates the signals reflected off the enemy submarine from those bouncing off the sea bed.These vessels will also have the ability to sprint fast for short bursts order to maintain contact with a submarine.After that, GRSE must deliver two more ASWSWCs annually, completing delivery by April 2026.
    [Show full text]
  • Oral History Interview with Martin Hellman
    An Interview with MARTIN HELLMAN OH 375 Conducted by Jeffrey R. Yost on 22 November 2004 Palo Alto, California Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright 2004, Charles Babbage Institute Martin Hellman Interview 22 November 2004 Oral History 375 Abstract Leading cryptography scholar Martin Hellman begins by discussing his developing interest in cryptography, factors underlying his decision to do academic research in this area, and the circumstances and fundamental insights of his invention of public key cryptography with collaborators Whitfield Diffie and Ralph Merkle at Stanford University in the mid-1970s. He also relates his subsequent work in cryptography with Steve Pohlig (the Pohlig-Hellman system) and others. Hellman addresses his involvement with and the broader context of the debate about the federal government’s cryptography policy—regarding to the National Security Agency’s (NSA) early efforts to contain and discourage academic work in the field, the Department of Commerce’s encryption export restrictions (under the International Traffic of Arms Regulation, or ITAR), and key escrow (the so-called Clipper chip). He also touches on the commercialization of cryptography with RSA Data Security and VeriSign, as well as indicates some important individuals in academe and industry who have not received proper credit for their accomplishments in the field of cryptography. 1 TAPE 1 (Side A) Yost: My name is Jeffrey Yost. I am from the Charles Babbage Institute and am here today with Martin Hellman in his home in Stanford, California. It’s November 22nd 2004. Yost: Martin could you begin by giving a brief biographical background of yourself—of where you were born and where you grew up? Hellman: I was born October 2nd 1945 in New York City.
    [Show full text]
  • Dr. Adi Shamir
    using the encryption key, allowing anyone to verify the signatory as “Electronics, Information and Communication” field the one with the decryption key. Achievement : Contribution to information security through pioneering research on cryptography The invention of the secret sharing scheme which Dr. Adi Shamir (Israel) protects information from disasters Born: July 6, 1952 (Age: 64, Nationality: Israel) Professor, Weizmann Institute of Science Information dispersal is crucial for the secure storage of important data. In 1979, Dr. Shamir was the first to propose the “secret sharing Summary scheme,” which specifies the dispersal method that ensures the security The advent of open digital networks, namely the Internet, has enabled of information depending on the extent of dispersed information us to lead a convenient lifestyle like never before. Such comfort has leakage. This was achieved using the polynomial method. been made possible thanks to security measures preventing the theft and Based on the fact that a straight line is a first degree polynomial, and a parabola manipulation of valuable information. It is Dr. Adi Shamir who proposed is a second degree polynomial, secret information is represented as points on the many of the underlying concepts in information security and developed polynomial. Points other than the secret information are dispersed and stored. By a series of practical solutions. doing so, a first degree polynomial requires two pieces of dispersed information, Information in digital networks is coded in binary digits. Utilizing and that of the second degree requires three pieces of dispersed information to mathematical methodology, Dr. Shamir has invented and proposed recover the secret information.
    [Show full text]
  • “MIT Unlocks Cryptography for the Masses” How MIT People Played a Major Role in the Early Development of Public Key Cryptography
    “MIT Unlocks Cryptography for the Masses” How MIT people played a major role in the early development of public key cryptography. by Ed Radlo ‘67 May 30, 2020 1 Why is PKC important? It’s what made it possible to conduct confidential (encrypted) communications over open (unsecure) networks, most notably the Internet. • enabled e-commerce • enabled confidential (encrypted) e-mails over unsecure networks PKC is a two-sided coin: encryption and authentication. • Running the algorithm in forward gives encryption. • Running the algorithm in reverse gives authentication. Authentication, implemented by digital signatures, gives three things: 1. mathematical proof that the message hasn’t been altered 2. mathematical proof that the nominal sender was the actual sender 3. the sender can’t repudiate that s/he sent the message 2 History of Encryption Has been around for thousands of years. • Used by Egyptians and Phoenicians in 2000 B.C. • Mostly military applications. • Same key used for encryption and decryption (symmetric cryptography). • PKC is asymmetric cryptography. In the 1970’s, computers became increasingly widespread. • DES was the first widely used commercial encryption algorithm developed by IBM symmetric NBS (now NIST) made it a government standard in 1977 NSA made it intentionally weak o government had a monopoly until 1970’s o fear that encryption would get in the wrong hands 3 The Public Key Revolution PKC per se invented by Whitfield Diffie and Martin Hellman in 1976. • Whit Diffie – MIT ‘65 • Marty Hellman – assistant professor of Electrical Engineering at MIT (1969 – 1971) Three parts to the invention: 1. key broken into two – public portion and private portion computationally infeasible to derive the private key from the public key Rivest and Hellman also credit Ralph Merkle with this part 2.
    [Show full text]
  • Current Affairs July 2019
    D E F E N C E O F F I C E R S A C A D E M Y J U L Y 2 0 1 9 C U R R E N T A F F A I R S New Batch 19 Aug 2019 P R E P A R E D A N D P R E S E N T E D B Y DEFENCE OFFICERS ACADEMY 26 Aug 2019 *JUNIOR WING-D-22, NEHRU COLONY DEHRADUN (U.K.) 02 Sept 2019 *SENIOR WING- 153, E.C. ROAD DEHRADUN(U.K.) PHONE: 7060503010, 7060500801 / 802 / 803 09 Sept 2019 About defence officers academy A L I T T L E B I T A B O U T Defence Officers Academy is a D E F E N C E O F F I C E R S premier Defence coaching institute A C A D E M Y in Nehru Colony, Dehradun which prepares candidates for various examinations for entrance to schools and institutions such as RIMC, Sainik Schools, RMS, NDA, IMA/OTA, AFCAT and ACC. Established in 2015 with an aim to provide high quality transformational training to students, Defence Officers Academy trains to improve their individual performance so that their full Team DOA potential can be reached and they can do best possible in the entrance exams. 0 1 Vision & Mission Vision: To provide best training to the young candidates so that they can join the defence schools and to produce employable resource for defence sector. We aim to remain source of inspiration for society to make the future better with the help of our Team DOA knowledge, imagination and Motto: The motto of Defence innovation.
    [Show full text]