In the question below is given a statement followed by two courses of action numbered I and II. You have to assume everything in the statement to be true and on the basis of the information given in the statement, decide which of the suggested course of action logically follow(s) for pursuing. Statement: Women in general prisons are subject to custodial torture by male staff, denial of health services, and lack of clean water and food. Courses of Action: I: The Government should provide separate jails for females with female staff. II: The prisons should be made of bricks.

In the question below is given a statement followed by two courses of action numbered I and II. You have to assume everything in the statement to be true and on the basis of the information given in the statement, decide which of the suggested course of action logically follow(s) for pursuing. Statement: Women in general prisons are subject to custodial torture by male staff, denial of health services, and lack of clean water and food. Courses of Action: I: The Government should provide separate jails for females with female staff. II: The prisons should be made of bricks. Correct Answer Only I follows

From the statement above, we are informed about the wrong treatment of female prisoners in the jails. Therefore, in order to prevent it, the Government should provide separate jails for females with female staff.
Therefore, I follows.

On the other hand, reconstructing the prisons is not a viable course of action.
Therefore, II does not follow.

Hence, Only I follows.

Related Questions

In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested courses of action logically follow(s) for pursuing. Statement: Soon you would not need to carry original copies of all vehicle papers like driving licence, vehicle registration certificate, insurance, pollution certificate or the permits issued to commercial vehicles with you. According to a ToI report, the Centre plans to amend Motor Vehicles Rules to make it legal for any citizen to carry digital vehicle documents and simultaneously making it compulsory for traffic police to accept digital version of documents. This means that you would not have to carry physical papers in your vehicle as digital copies of the certificates would be valid.  Courses of action: I. The ministry has proposed installation of FASTags on the front windscreens. FASTag is a device that uses radio frequency identification (RFID) technology for making toll payments directly from the user account.  II. To avail the facility, one has to store all the vehicle documents on the government's cloud-based service DigiLocker and when asked he/she can simply display the stored certificates on a smartphone or any other digital devices. These digital copies can be shared with other departments as identity and address proof.  III. The government has increased the maximum load carrying capacity of heavy vehicles, including trucks, by 20-25 per cent besides scrapping the mandatory annual renewal of fitness certificates for freight carriers. Fitness certificates for trucks would now be renewed in every two years not annually.  Which of the following course/courses of action can be said to be said to be a rudimentary course/courses of action?
In the question below, is given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested courses of action logically follow (s) for pursuing. Statement: The numbers are impressive. In its quest towards Swachh Bharat, the government has built 4.98 crore rural household latrines in the last three years. What's more, recent surveys by the NSSO and the Quality Council of India show that over 90% people with access to toilets are using them. Launched with the idea of Clean India, it is expanding from urban to the rural areas and is spreading awareness among the masses. Courses of action: I. Given that most rural areas in India lack proper drainage and a sewage network, the government has focused on building twin-pit toilets. But there is no data on whether the size of hastily built twin pits takes into account the number of users, and whether each pit is enough to collect waste for three years.  II. While this is a positive indicator, there are many other areas that need attention such as the shortage of water, sensitization of citizens, proper maintenance and usage of toilets, and overcoming the resistance to dry manure made from human waste.  III. One of the biggest challenges for Swachh Bharat in rural areas is managing liquid waste, which pollutes natural water bodies. Though the scheme covers this aspect as well, the immediate focus is to deal with open defecation.
In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.