Questions are framed from the February 2016 monthly magazine.Go through it to answer the questions better.

Answer in 200 words each

  1. What is El-Nino and La-Nina ? What are their possible impacts on Indian monsoon ? Supposing that you are a district collector of a drought-hit region, what are the administrative measures you will take to tackle the problem arising out of deficient monsoon.
  2. Lately both Ebola and Zika viruses have been posing serious threats to public health across the world.In this context, analyze India’s vulnerability and preparedness to tackle these crises.
  3. What is AYUSH ? How the components differ from each other ? What are the Government of India’s initiatives in this regard ? Can AYUSH  provide holistic healthcare ?
  4.  Write a brief note on Solar energy and India’s engagement in this regard.Bring out the possible impediments to realize the goal of solar energy and suggest a way forward.
  5. Write a brief note on genetically modified crops and how they differ from hybrid crops.What are the possible challenges and benefits of GM crops?
  6. If roads are the artery of India , railway is it’s spine.In this context critically analyze India’s infrastructure impediments and suggest a way forward.
  7. Do you think India is in a “sweet-spot” as far as world economics is concerned ? Provide rationale behind your observation.
  8. What is co-operative and competitive federalism ? Do you think proper infusion of this two concepts can help India usher in a greater success ?
  9. In light of recent TRAI order, critically analyse net neutrality and it’s various components ?
  10. Write a note on food security and various challenges in this regard.Write critical note on Government of India’ initiatives towards ensuring food security and suggest a way forward.
  11. It is often said that India is a sleeping giant. How to wake it up ?
  12. Write a brief note on protected area network of India and their significance for sustenance of  Indian civilization.

If you want your answer to be reviewed -write it in a pen/paper medium and send it as a single PDF to for review.If you write in the comment section and we will provide the review there too.


Thank You




Share is Caring, Choose Your Platform!


and stay updated

Related Posts

Recent Posts

  • Darknet


    Darknet, also known as dark web or darknet market, refers to the part of the internet that is not indexed or accessible through traditional search engines. It is a network of private and encrypted websites that cannot be accessed through regular web browsers and requires special software and configuration to access.

    The darknet is often associated with illegal activities such as drug trafficking, weapon sales, and hacking services, although not all sites on the darknet are illegal.


    Examples of darknet markets include Silk Road, AlphaBay, and Dream Market, which were all shut down by law enforcement agencies in recent years.

    These marketplaces operate similarly to e-commerce websites, with vendors selling various illegal goods and services, such as drugs, counterfeit documents, and hacking tools, and buyers paying with cryptocurrency for their purchases.

    Pros :

    • Anonymity: Darknet allows users to communicate and transact with each other anonymously. Users can maintain their privacy and avoid being tracked by law enforcement agencies or other entities.
    • Access to Information: The darknet provides access to information and resources that may be otherwise unavailable or censored on the regular internet. This can include political or sensitive information that is not allowed to be disseminated through other channels.
    • Freedom of Speech: The darknet can be a platform for free speech, as users are able to express their opinions and ideas without fear of censorship or retribution.
    • Secure Communication: Darknet sites are encrypted, which means that communication between users is secure and cannot be intercepted by third parties.


    • Illegal Activities: Many darknet sites are associated with illegal activities, such as drug trafficking, weapon sales, and hacking services. Such activities can attract criminals and expose users to serious legal risks.
    • Scams: The darknet is a hotbed for scams, with many fake vendors and websites that aim to steal users’ personal information and cryptocurrency. The lack of regulation and oversight on the darknet means that users must be cautious when conducting transactions.
    • Security Risks: The use of the darknet can expose users to malware and other security risks, as many sites are not properly secured or monitored. Users may also be vulnerable to hacking or phishing attacks.
    • Stigma: The association of the darknet with illegal activities has created a stigma that may deter some users from using it for legitimate purposes.

    Artificial Intelligence


    AI, or artificial intelligence, refers to the development of computer systems that can perform tasks that would normally require human intelligence, such as recognizing speech, making decisions, and understanding natural language.


    • Virtual assistants: Siri, Alexa, and Google Assistant are examples of virtual assistants that use natural language processing to understand and respond to users’ queries.
    • Recommendation systems: Companies like Netflix and Amazon use AI to recommend movies and products to their users based on their browsing and purchase history.

    Pros :

    • Efficiency: AI systems can work continuously without getting tired or making errors, which can save time and resources.
    • Personalization: AI can help provide personalized recommendations and experiences for users.
    • Automation: AI can automate repetitive and tedious tasks, freeing up time for humans to focus on more complex tasks.


    • Job loss: AI has the potential to automate jobs previously performed by humans, leading to job loss and economic disruption.
    • Bias: AI systems can be biased due to the data they are trained on, leading to unfair or discriminatory outcomes.
    • Safety and privacy concerns: AI systems can pose safety risks if they malfunction or are used maliciously, and can also raise privacy concerns if they collect and use personal data without consent.