Practice Questions on Important Topics from Current Affairs:(12.05.2025)
1. Despite being the backbone of grassroots mobilization, women from marginalized sections often remain excluded from decision-making roles in the women's movement in India. Critically examine this paradox and suggest measures to ensure inclusive leadership.(250w, 15m)
2.In light of shifting global dynamics, discuss the need for a fundamental reset in India's manufacturing sector and suggest suitable policy measures to achieve sustainable manufacturing growth.(250w, 15m)
Practice Questions on Important Topics from Current Affairs:(12.05.2025)
1. Despite being the backbone of grassroots mobilization, women from marginalized sections often remain excluded from decision-making roles in the women's movement in India. Critically examine this paradox and suggest measures to ensure inclusive leadership.(250w, 15m)
2.In light of shifting global dynamics, discuss the need for a fundamental reset in India's manufacturing sector and suggest suitable policy measures to achieve sustainable manufacturing growth.(250w, 15m)
I have no inside knowledge of a potential stock listing of the popular anti-Whatsapp messaging app, Telegram. But I know this much, judging by most people I talk to, especially crypto investors, if Telegram ever went public, people would gobble it up. I know I would. I’m waiting for it. So is Sergei Sergienko, who claims he owns $800,000 of Telegram’s pre-initial coin offering (ICO) tokens. “If Telegram does a SPAC IPO, there would be demand for this issue. It would probably outstrip the interest we saw during the ICO. Why? Because as of right now Telegram looks like a liberal application that can accept anyone - right after WhatsApp and others have turn on the censorship,” he says.
Newly uncovered hack campaign in Telegram
The campaign, which security firm Check Point has named Rampant Kitten, comprises two main components, one for Windows and the other for Android. Rampant Kitten’s objective is to steal Telegram messages, passwords, and two-factor authentication codes sent by SMS and then also take screenshots and record sounds within earshot of an infected phone, the researchers said in a post published on Friday.