With the reference to the function of the Public Sector in India, which of the following statements is/are correct? I. To provide public utility resources II. To build social and economic overhead capital III. To ensure balanced regional and sectoral growth IV. To pursue egalitarian goals Select the correct answer using the codes given below :

With the reference to the function of the Public Sector in India, which of the following statements is/are correct? I. To provide public utility resources II. To build social and economic overhead capital III. To ensure balanced regional and sectoral growth IV. To pursue egalitarian goals Select the correct answer using the codes given below : Correct Answer I, II, III and IV are correct

The correct answer is I, II, III and IV are correct.

Key Points

  • The Function of Public Sector in India
    • To provide public utility resources
    • To build social and economic overhead capital
    • To ensure balanced regional and sectoral growth
    • To pursue egalitarian goals
    • Generation of Income
    • Capital Formation
    • Employment
    • Infrastructure
    • Strong Industrial base
    • Export Promotion and Import Substitution
    • Contribution to Central Exchequer
    • Checking Concentration of Income and Wealth

Additional Information

  • Before Independence, there were few ‘Public Sector’ Enterprises in the country.
    • These included the Railways, the Posts, and Telegraphs, the Port Trusts, the Ordnance Factories, All India Radio, few enterprises like the Government Salt Factories, Quinine Factories, etc. which were departmentally managed.
  • Independent India adopted planned economic development policies in a democratic, federal polity.
  • The country was facing problems like inequalities in income and low levels of employment, regional imbalances in economic development, and lack of trained manpower.
  • India at that time was predominantly an agrarian economy with a weak industrial base, low level of savings, inadequate investments, and infrastructure facilities.
  • Because of this type of socio-economic setup, our visionary leaders drew up a roadmap for the development of the Public Sector as an instrument for self-reliant economic growth.
  • This guiding factor led to the passage of the Industrial Policy Resolution of 1948 and followed by the Industrial Policy Resolution of 1956.

Related Questions

In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.
In each question below, a statement is given numbered I, II and III. An assumption is something which is supposed or taken for granted. You have to consider the following assumptions and decide which of the assumptions is implicit in the statement. Statement: An initial meeting for a military exercise, which was scheduled to be conducted in September as part of the Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) nations, was held at headquarters of Army's Southern Command, Pune this week, the Army said today. Armies of the BIMSTEC countries comprising India, Sri Lanka, Bangladesh, Bhutan, Nepal, Thailand and Myanmar would be participating in the BIMSTEC Military Exercise (MILEX) from September 10 to 16 at the Foreign Training Node, Pune, the Army said in a statement.  Assumptions: I. The aim of the conclave was to exchange ideas between the senior-most Army leadership of these regional nations in order to enhance operational synergy. II. The aim of the exercise was to create synergy, better understanding and evolve an institutionalized military forum for regional cooperation in the field of counter-terrorist operations among the member states.  III. The exercise would culminate in a chiefs' conclave scheduled on September 15 and 16, where the heads of the armies of the seven participating nations would get together to review this multi-nation exercise.