{"id":19691,"date":"2018-05-09T13:30:50","date_gmt":"2018-05-09T08:00:50","guid":{"rendered":"http:\/\/blog.forumias.com\/?p=19691"},"modified":"2018-05-08T10:29:26","modified_gmt":"2018-05-08T04:59:26","slug":"answers-mains-marathon-upsc-mains-current-affairs-questions-may-8-2018","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/answers-mains-marathon-upsc-mains-current-affairs-questions-may-8-2018\/","title":{"rendered":"Answers: Mains Marathon \u2013 UPSC Mains Current Affairs Questions \u2013 May 8, 2018"},"content":{"rendered":"<p><strong><a href=\"http:\/\/blog.forumias.com\/mains-marathon\/\" target=\"_blank\" rel=\"noopener\">Archives<\/a><\/strong><\/p>\n<hr \/>\n<p><span style=\"font-weight: 400;\">Q1) The mandatory use of digital identities requires clearly establishing a legitimate state interest and enacting a proportional and just law. Elaborate (GS &#8211; 3)<\/span><\/p>\n<p><b>Introduction:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Databases linked by unique identities can possibly create an infrastructure for totalitarian observation of citizens\u2019 activities across different domains<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The mere existence of such infrastructure, if unrestricted, can potentially disturb the balance of power between the citizens and the state, stifle dissent and be a threat to civil liberty and democracy<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Not only can personal information leach out and be used by unpredictable entities in unpredictable ways, but one can also be mis-profiled, wrongly assessed or even influenced using out-of-context data, without being able to control such actions or sometimes even being aware of them<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Exclusions and denials because of poorly thought out use cases, like perhaps because fingerprints do not match, are more direct violations.<\/span><\/li>\n<\/ul>\n<p><b>What India needs to do?<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">We should have stricter provisions than the sector-specific standards in the US<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">India should ideally have a more innovation-friendly setup than what the European General Data Protection Regulation (GDPR) can offer, which perhaps is unduly restrictive but is unlikely to be commensurately effective<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Our designs need to be especially sensitive to our large under-privileged population, which may not have the necessary cultural capital to deal with overly complex digital setups<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Not only do the data regulators require independent authority, but they also need to actively participate in the data protection architecture<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Apart from determining the fairness of algorithms and use cases, they need to play two other main roles<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The first should be to determine, and explicitly list out, authorisations for data access for various data processing functions based on a rights-based principle in addition to consent<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Purpose limitation needs to be built into such authorisations, and all-purpose extension requirements must be explicitly considered<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The second role should be to ensure that data can be accessed only through audited, pre-approved and digitally signed computer programs after online authentication and verification of the authorisations presented<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Both the data regulator and the data controller should maintain non-repudiable logs of all data accesses, and neither should be able to access the data independent of the other. <\/span><b>\u00a0<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Q2) What do you mean by the term In-Flight-Connectivity? How is it made available and issues involved in the same? <\/span><\/p>\n<p><b>Introduction: <\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Inflight connectivity consists of internet and mobile connectivity in the airspace. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">As the aircraft is out of reach of the mobile towers on the ground, an inflight service provider provides a link between the electronic devices on the aircraft and the towers on the ground.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">With the proliferation of mobile phones and internet, there has been a strong demand for mobile and data connectivity on flights, especially in long haul flights where the passengers are cut off from the ground for long periods of time., for example 15 hours.<\/span><\/li>\n<\/ul>\n<p><b>In-flight internet services are made available through geostationary satellites, widely used for TV signals and weather forecast. The technologies used are as follows: <\/b><\/p>\n<p><b>Technology 1:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">An onboard antenna picks up signals from the nearest tower on the ground, just like, say, a moving car.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Unless the aircraft passes over a big water body with no towers, the connection will remain seamless up to a certain altitude.<\/span><\/li>\n<\/ul>\n<p><b>Technology 2:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Satellites can be used to connect to ground stations, similar to the way satellite TV signals are transmitted.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The data is transmitted to a personal electronic device through an onboard router, which connects to the plane\u2019s antenna. The antenna transmits the signals, through satellites, to a ground station, which redirects the traffic to a billing server that calculates the data consumption. It is then relayed to the intercepting servers, and to the World Wide Web.<\/span><\/li>\n<\/ul>\n<p><b>Issues:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Cost of installation: <\/b><span style=\"font-weight: 400;\">The cost of installation would be huge. It would be easier to have the equipment installed on new aircrafts rather than taking planes out of service for retrofitting.It might also lead to disruption in services.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Noise in aircrafts: <\/b><span style=\"font-weight: 400;\">Service will help travellers immensely, although noise levels within aircraft may rise.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Cost of making calls:<\/b><span style=\"font-weight: 400;\">These are satellite calls. The prices will be equal to roaming rates. Might not be preferred by all passengers.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Rise in ticket prices:<\/b><span style=\"font-weight: 400;\">Depending on airlines\u2019 commercial decisions, the additional cost could find a way into ticket prices, which are already under pressure from rising fuel prices. The charges may not be recoverable from passengers in short-haul flights.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Extra fuel cost: <\/b><span style=\"font-weight: 400;\">\u00a0Apart from the equipment cost, airlines will have to bear additional fuel costs, given the extra weight and drag aircraft will face due to the antenna.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Speed issues: \u00a0<\/b><span style=\"font-weight: 400;\">WiFi on a plane is much slower than on the ground.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Q3) Write short notes on:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">a) Hague convention on the civil aspects of international child abduction.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The Hague Convention on the Civil Aspects of International Child Abduction or Hague Abduction Convention is a multilateral treaty developed by the Hague Conference on Private International Law (HCCH) that provides an expeditious method to return a child internationally abducted by a parent from one member country to another.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The Hague Convention protects children and their families against the risks of illegal, irregular, premature or ill-prepared adoptions abroad.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The Hague Convention does not allow private adoptions in the child&#8217;s home country.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Adoption is a handled by the provinces and territories, and they all have and follow laws implementing the Hague Convention. They can explain the rules you need to follow under the Hague Convention and for adoptions from a country that is not a party to the Convention.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">India has not yet ratified the convention and has formed an expert panel to look into it.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">b) China Pakistan economic corridor<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The Belt and Road Initiative (BRI) is China\u2019s ambitious project for increasing connectivity and economic cooperation within Eurasia.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">China Pakistan economic corridor is a part of China&#8217;s BRI.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It passes through a disputed region between India and Pakistan.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">CPEC is intended to rapidly modernize Pakistani infrastructure and strengthen its economy by the construction of modern transportation networks, numerous energy projects, and special economic zones.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> On 13 November 2016, CPEC became partly operational when Chinese cargo was transported overland to Gwadar Port for onward maritime shipment to Africa and West Asia, while some major power projects were commissioned by late 2017.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">India\u2019s not joined China\u2019s BRI mainly due to CPEC which directly affects the sovereignty of India.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Archives Q1) The mandatory use of digital identities requires clearly establishing a legitimate state interest and enacting a proportional and just law. Elaborate (GS &#8211; 3) Introduction: Databases linked by unique identities can possibly create an infrastructure for totalitarian observation of citizens\u2019 activities across different domains The mere existence of such infrastructure, if unrestricted, can&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/answers-mains-marathon-upsc-mains-current-affairs-questions-may-8-2018\/\">Continue reading <span class=\"screen-reader-text\">Answers: Mains Marathon \u2013 UPSC Mains Current Affairs Questions \u2013 May 8, 2018<\/span><\/a><\/p>\n","protected":false},"author":61,"featured_media":2292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[25,9],"tags":[],"class_list":["post-19691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mains-marathon-answers","category-public","entry"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/forumias.com\/blog\/wp-content\/uploads\/2017\/06\/pen-paper-laptop.jpg?fit=1000%2C500&ssl=1","views":{"total":0,"cached_at":1700790390,"cached_date":1704957075},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/19691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=19691"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/19691\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media\/2292"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=19691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=19691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=19691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}