{"id":14220,"date":"2018-01-10T13:00:12","date_gmt":"2018-01-10T07:30:12","guid":{"rendered":"http:\/\/blog.forumias.com\/?p=14220"},"modified":"2018-01-08T17:22:24","modified_gmt":"2018-01-08T11:52:24","slug":"answers-mains-marathon-upsc-mains-current-affairs-questions-january-9-2018","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/answers-mains-marathon-upsc-mains-current-affairs-questions-january-9-2018\/","title":{"rendered":"Answers: Mains Marathon \u2013 UPSC Mains Current Affairs Questions \u2013 January 9, 2018"},"content":{"rendered":"<p><strong><a href=\"http:\/\/blog.forumias.com\/mains-marathon\/\" target=\"_blank\" rel=\"noopener\">Archives<\/a>\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Q.1) Uniform civil code is the proposal to replace the personal laws of India. What are these personal laws? Define with examples. what are the challenges in the effective implementation of Uniform civil code? \u00a0(GS &#8211; 2) <\/span><\/p>\n<p><b>Introduction:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Uniform civil code is the proposal to replace the personal laws which are based on the scriptures and customs of each major religious community in India with a common set governing every citizen.<\/span><\/li>\n<\/ul>\n<p><b>Personal laws:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Law that applies to a particular person or class of persons only wherever situated \u2014distinguished from territorial law is called personal laws.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Having a Uniform Civil Code will mean that all these laws will be replaced by a new law which will be applicable for all irrespective of their religions.<\/span><\/li>\n<\/ul>\n<p><b>Some of these personal laws are as follows:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Hindu Marriage Act: <\/b><span style=\"font-weight: 400;\">The Hindu Marriage Act is an Act of the Parliament of India enacted in 1955.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The main purpose of the act was to amend and codify the law relating to marriage among Hindus and others.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Muslim Personal Law (Shariat) Application Act:<\/b> <span style=\"font-weight: 400;\">This Act makes provisions for the application of the Muslim Personal law (Shariat) to Muslims.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Christian Marriage Act:<\/b> <span style=\"font-weight: 400;\">\u00a0This act consolidates and amends the law relating to the solemnization of the marriages of Christians<\/span><\/li>\n<li><b>Parsi Marriage and Divorce Act:<\/b> <span style=\"font-weight: 400;\">This act Act directly relates to the constitution and powers of Parsi Matrimonial Courts. <\/span><\/li>\n<li><span style=\"font-weight: 400;\">There is also a <\/span><b>Special Marriages Act<\/b><span style=\"font-weight: 400;\">, 1954 under which people can perform marriage irrespective of the religion followed by either person.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">These laws deal with the matters involving marriage, divorce, inheritance, adoption, and maintenance of the respective religions.<\/span><\/li>\n<\/ul>\n<p><b>Criticism of Uniform civil code:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The vast diversity of the personal laws, along with the devotion to which they are adhered to, makes uniformity of any sort very difficult to achieve.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Even under the Hindu Marriage Act, 1955, marriages may be solemnised in accordance with the rites and ceremonies of a variety of people who come under the definition of a Hindu.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">In the Muslim law too, though there are no elaborate rites or ceremonies, there exist some differences between the Sunni and Shia marriages<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Many people still do not know what the Uniform Civil Code really means.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">There are still false conceptions surrounding it, especially amongst the minorities, which make a rational debate on its implementation quite difficult.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">UCC is also sometimes perceived as the imposition of the Hindu code and procedures, and this adds to its <\/span><b>opposition from the minorities<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Some people also argue that it would lead to a loss of the culture and the identity of the minorities in the Indian society.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Q.2) Give an account of the Cyber terrorism in India. What are the causes and consequences of its rapid growth? (GS-3)<\/span><\/p>\n<p><b>Introduction:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cyber terrorism refers to the <\/span><b>use of the Internet to conduct violent acts<\/b><span style=\"font-weight: 400;\"> that result in or <\/span><b>threaten the loss of life or physical harm<\/b><span style=\"font-weight: 400;\"> in order to achieve political gains through intimidation.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cyber terrorism not only <\/span><b>affects the human beings but also cause threat to national security<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<p><b>India on Cyber terrorism:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">According to some terrorism experts Internet has proven effective only at spreading ideology but has <\/span><b>failed extensively when used as a planning and operational tool<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">On an instance of <\/span><b>Mumbai terror attack in November 2008<\/b><span style=\"font-weight: 400;\">, the plan was carried out by the terrorist actually trained at physical camps.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">There is <\/span><b>no law dealing with the prevention off any cyber-attack<\/b><span style=\"font-weight: 400;\">, except for an analogous provision, which is as follows:<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Protection available under the Constitution of India-<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A Supreme Court\u2019s document providing protection is the strongest and safest.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Protection available under other statues.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Protection under the Indian Penal Code (I\/P\/C\/0, 1860, and<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Protection under the Information Technology Act (ITA), 2000.<\/span><\/li>\n<\/ul>\n<p><b>Causes of Cyber-terrorism<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><b>audience of websites <\/b><span style=\"font-weight: 400;\">through which cyber crime is practiced matters, because it is them who are enticed by what terrorists are trying to show<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">These websites use their <\/span><b>local language, slogans that are catchy, and hurt them in an area which is sacred to them for example religion<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">They target <\/span><b>professional journalists<\/b><span style=\"font-weight: 400;\"> as well; there are <\/span><b>press releases<\/b><span style=\"font-weight: 400;\"> on their websites.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Their website <\/span><b>portray that they are fighting a psychological warfare<\/b><span style=\"font-weight: 400;\"> and use internet as a <\/span><b>platform for their campaigns<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">People even who don\u2019t believe in their agenda gets <\/span><b>hitched to the very concept of terror website<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<p><b>Solutions of Cyber terrorism:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Defense mechanism dealing with internet based crime is broadly divided into two forms of defense, namely, <\/span><b>passive and active defense<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Passive defense <\/span><b>uses various technologies and products<\/b><span style=\"font-weight: 400;\"> such as firewalls, cryptography and procedures like dial-in to protect the Information Technology (IT) assets.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Active defense <\/span><b>imposes serious risks and penalty on the attacker<\/b><span style=\"font-weight: 400;\">. Risks can be in form of identification, exposure, investigations, exposure, prosecution, counter attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Individuals <\/span><b>should avoid disclosing any personal information to strangers via e-mail or while chatting<\/b><span style=\"font-weight: 400;\">, they persuasive way of controller is to play with their mind.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Parents need to keep a watch<\/b><span style=\"font-weight: 400;\"> on the sites that their children are accessing. The targets nowadays are mostly teenagers.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Web servers running public sites must be physically separately protected<\/b><span style=\"font-weight: 400;\"> from internal corporate network.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Strict statutory laws need to be passed<\/b><span style=\"font-weight: 400;\"> by the Legislatures keeping in mind the interest of citizens. <\/span><\/li>\n<li style=\"font-weight: 400;\"><b>IT department should pass certain guideli<\/b><span style=\"font-weight: 400;\">nes for the protection of computer system and should also bring out strict laws.<\/span><\/li>\n<\/ul>\n<p><b>Conclusion:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cyber terrorism is the problem affecting all the nations, there is need to arrange more of international forums like Global Counterterrorism Forum to avoid such cases.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Rational and intelligent approach need to be engaged to avoid cyber terrorism. Government should come up with more stringent legislations in this regard.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Q.3 Write short notes on the following:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">a)<\/span><span style=\"font-weight: 400;\"> \u00a0<\/span><span style=\"font-weight: 400;\">Lone-Wolf technique of terrorism (GS-3)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">b)<\/span><span style=\"font-weight: 400;\"> \u00a0<\/span><span style=\"font-weight: 400;\">The African Development Bank (GS-3)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">c)<\/span><span style=\"font-weight: 400;\">\u00a0 <\/span><span style=\"font-weight: 400;\">Agricultural and Processed Food Products Export Development Authority (APEDA) (GS-3)<\/span><\/p>\n<p><b>a) Lone-Actor Terrorism:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A lone wolf, lone-wolf terrorist or lone actor, is someone <\/span><b>who prepares and commits violent acts alone, outside of any command structure and without material assistance from any group<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">He or she may be <\/span><b>influenced or motivated by the ideology and beliefs of an external group<\/b><span style=\"font-weight: 400;\"> and may act in support of such a group.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Lone-actor terrorism <\/span><b>may or may not have any remote source<\/b><span style=\"font-weight: 400;\"> that is controlling them but there always remain a grey area.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The question that becomes a matter of importance is <\/span><b>when and where does the contact and control begins<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Government fails to get hold of any lone-attacker<\/b><span style=\"font-weight: 400;\"> as they commonly belong to the origin of the state.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">There <\/span><b>is no record howsoever of any terrorist travelling across<\/b><span style=\"font-weight: 400;\"> to carry an attack.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Vehicles like Vans, trucks, a small gun can be carried easily to any public place, the attacks are unforeseen and therefore the panic and casualty is more.<\/span><\/li>\n<\/ul>\n<p><b>b) The African Development Bank:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Founded in 1948, ADB is a <\/span><b>multilateral development finance institution<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It provides <\/span><b>finance to African governments and private companies investing in the Regional Member Countries (RMC)<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Its fundamental duty is to <\/span><b>fight poverty and improve the standard of living<\/b><span style=\"font-weight: 400;\"> of the continent by investing in projects and programs which uplifts the socio-economic conditions of the common mass.<\/span><\/li>\n<\/ul>\n<p><b>Functions:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The primary function of AfDB is making loans and equity investments for the socio-economic advancement of the RMC.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Secondly, the bank provides technical assistance for development projects and programs.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Thirdly, it promotes investment of public and private capital for development.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Fourthly,<\/span> <span style=\"font-weight: 400;\">the bank assists in organizing the development policies of RMCs.<\/span><\/li>\n<\/ul>\n<p><b>c) Agricultural and Processed Food Products Export Development Authority (APEDA):<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The Agricultural and Processed Food Products Export Development Authority (APEDA) was established by the <\/span><b>Government of India under the Agricultural and Processed Food Products Export Development Authority Act passed by the Parliament in December, 1985<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">APEDA has marked its presence in almost all <\/span><b>agro potential states of India and has been providing services to agri-export community<\/b><span style=\"font-weight: 400;\"> through its head office, five Regional offices and 13 Virtual offices.<\/span><\/li>\n<\/ul>\n<p><b>Duties of APEDA:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Development of industries relating to the scheduled products for export by way of providing financial assistance or otherwise for undertaking surveys and feasibility studies, participation in enquiry capital through joint ventures and other reliefs and subsidy schemes.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Registration of persons as exporters of the scheduled products on payment of such fees as may be prescribed.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Fixing of standards and specifications for the scheduled products for the purpose of exports.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Archives\u00a0 Q.1) Uniform civil code is the proposal to replace the personal laws of India. What are these personal laws? Define with examples. what are the challenges in the effective implementation of Uniform civil code? \u00a0(GS &#8211; 2) Introduction: Uniform civil code is the proposal to replace the personal laws which are based on the&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/answers-mains-marathon-upsc-mains-current-affairs-questions-january-9-2018\/\">Continue reading <span class=\"screen-reader-text\">Answers: Mains Marathon \u2013 UPSC Mains Current Affairs Questions \u2013 January 9, 2018<\/span><\/a><\/p>\n","protected":false},"author":61,"featured_media":2292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[25,9],"tags":[],"class_list":["post-14220","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mains-marathon-answers","category-public","entry"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/forumias.com\/blog\/wp-content\/uploads\/2017\/06\/pen-paper-laptop.jpg?fit=1000%2C500&ssl=1","views":{"total":0,"cached_at":"","cached_date":1704897548},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/14220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=14220"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/14220\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media\/2292"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=14220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=14220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=14220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}