With reference to the Maharatna Status, consider the following statements:
1. The Maharatna dispensation was ushered in by the Union government for mega Central Public Sector Enterprises (CPSEs) to become global giants (introduced in 2010).
2. “Maharatna” status is granted to a company which has recorded more than Rs. 5,000 crores of net profit for three consecutive years, an average annual turnover of Rs. 25,000 crore for three years or should have an average annual net worth of Rs. 15,000 crore for three years. It should also have global operations or footprints.
3. In India, no company gets the status due to fail to fulfill the criteria required
With reference to the Maharatna Status, consider the following statements:
1. The Maharatna dispensation was ushered in by the Union government for mega Central Public Sector Enterprises (CPSEs) to become global giants (introduced in 2010).
2. “Maharatna” status is granted to a company which has recorded more than Rs. 5,000 crores of net profit for three consecutive years, an average annual turnover of Rs. 25,000 crore for three years or should have an average annual net worth of Rs. 15,000 crore for three years. It should also have global operations or footprints.
3. In India, no company gets the status due to fail to fulfill the criteria required
BY Upsc prelims MCQ
Warning: Undefined variable $i in /var/www/tg-me/post.php on line 283
Durov said on his Telegram channel today that the two and a half year blockchain and crypto project has been put to sleep. Ironically, after leaving Russia because the government wanted his encryption keys to his social media firm, Durov’s cryptocurrency idea lost steam because of a U.S. court. “The technology we created allowed for an open, free, decentralized exchange of value and ideas. TON had the potential to revolutionize how people store and transfer funds and information,” he wrote on his channel. “Unfortunately, a U.S. court stopped TON from happening.”
Newly uncovered hack campaign in Telegram
The campaign, which security firm Check Point has named Rampant Kitten, comprises two main components, one for Windows and the other for Android. Rampant Kitten’s objective is to steal Telegram messages, passwords, and two-factor authentication codes sent by SMS and then also take screenshots and record sounds within earshot of an infected phone, the researchers said in a post published on Friday.