A. an adequate physical and social infrastructure level B. the pattern of spatial growth in these towns as also to C. the failure of the government to ensure D. the roots of the riots related to

A. an adequate physical and social infrastructure level B. the pattern of spatial growth in these towns as also to C. the failure of the government to ensure D. the roots of the riots related to Correct Answer DBCA

Related Questions

In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.
In each question below is given a statement numbered I, II and III. An assumption is something supposed or taken for granted. You have to consider the following assumption and decide which of the assumption is implicit in the statement. Statement: The June 2018 quarter results of Infosys reflect that the investors waiting for the company to perform as good, if not better, than its largest peer Tata Consultancy Services (TCS) may have to wait a little longer. Infosys, the country’s second-largest software exporter reported slower sequential growth in revenue and profit than TCS for the June quarter (Q1). It also lagged on the fronts of employee attrition and growth in the banking, financial services, and insurance (BFSI) vertical.  Assumptions: I. On the positive side, Infosys continued to add large clients – four in the above $100-million billing category compared with the previous quarter. It continued to retain guidance of 6-8% revenue growth for FY19 while retaining the operating margin band of 22-24%. II. In the near term, the stock performance of TCS is likely to overshadow Infosys given the difference in their growth trajectories. III. The growth momentum of Infosys has slowed relative to TCS. The year-on-year growth in trailing 12-month (TTM) revenue of Infosys in each of the four quarters up to the June 2018 quarter has lagged TCS after leading in the previous five quarters.