ANTHROPOLOGY – PAPER II

Odisha Civil Services Mains 2024

Time: 3 Hours
|Full Marks: 250

GROUP A

10 × 15 MARKS

Instructions: Attempt 10 (ten) questions. Word limit: 250 words.
  1. Write, in brief, about the contribution of Sarat Chandra Roy to the growth and development of anthropology in India.
  2. Critically discuss the Jajmani system in India.
  3. Write an essay on the movement led by Birsa Munda.
  4. How does anthropology contribute to the understanding of regionalism, communalism and ethnic movements?
  5. Land alienation and indebtedness are major problems of the tribes in India. Discuss citing examples.
  6. Give the classification of linguistic elements in the Indian population.
  7. Discuss the contribution of American anthropologists towards the development of village studies in India.
  8. What are the main features of the anthropological approach to the study of India’s society and culture? Discuss.
  9. Discuss the history of administration of tribal areas in India.
  10. Discuss the concepts of Karma and Rebirth as constituents of the Indian social system.
  11. Discuss the influence of Christianity on the tribes of India.
  12. Discuss the social change and development of tribes during the colonial rule in India.

GROUP B

05 × 20 MARKS

Instructions: Attempt 05 (five) questions. Word limit: 300 words.
  1. Explain how anthropology can play an important role towards tribal and rural development.
  2. Describe the methods adopted by Sir Herbert Hope Risley in classifying Indian population. What are the criticisms against Risley’s classification? Discuss in detail.
  3. Discuss the linguistic and socio-economic characteristics of the tribal population and their distribution.
  4. Explain the concept of Sacred Complex as given by L. P. Vidyarthi.
  5. Write about the social and economic status of Muslims as religious minorities in India.
  6. Discuss the impact of development projects on the tribes. What steps have been taken for their rehabilitation and resettlement?

UPSCTREE • OCS Exam Preparation

 

Share is Caring, Choose Your Platform!

Receive Daily Updates

Stay updated with current events, tests, material and UPSC related news

Recent Posts

  • Darknet

    Definition:

    Darknet, also known as dark web or darknet market, refers to the part of the internet that is not indexed or accessible through traditional search engines. It is a network of private and encrypted websites that cannot be accessed through regular web browsers and requires special software and configuration to access.

    The darknet is often associated with illegal activities such as drug trafficking, weapon sales, and hacking services, although not all sites on the darknet are illegal.

    Examples:

    Examples of darknet markets include Silk Road, AlphaBay, and Dream Market, which were all shut down by law enforcement agencies in recent years.

    These marketplaces operate similarly to e-commerce websites, with vendors selling various illegal goods and services, such as drugs, counterfeit documents, and hacking tools, and buyers paying with cryptocurrency for their purchases.

    Pros :

    • Anonymity: Darknet allows users to communicate and transact with each other anonymously. Users can maintain their privacy and avoid being tracked by law enforcement agencies or other entities.
    • Access to Information: The darknet provides access to information and resources that may be otherwise unavailable or censored on the regular internet. This can include political or sensitive information that is not allowed to be disseminated through other channels.
    • Freedom of Speech: The darknet can be a platform for free speech, as users are able to express their opinions and ideas without fear of censorship or retribution.
    • Secure Communication: Darknet sites are encrypted, which means that communication between users is secure and cannot be intercepted by third parties.
    •  

    Cons:

    • Illegal Activities: Many darknet sites are associated with illegal activities, such as drug trafficking, weapon sales, and hacking services. Such activities can attract criminals and expose users to serious legal risks.
    • Scams: The darknet is a hotbed for scams, with many fake vendors and websites that aim to steal users’ personal information and cryptocurrency. The lack of regulation and oversight on the darknet means that users must be cautious when conducting transactions.
    • Security Risks: The use of the darknet can expose users to malware and other security risks, as many sites are not properly secured or monitored. Users may also be vulnerable to hacking or phishing attacks.
    • Stigma: The association of the darknet with illegal activities has created a stigma that may deter some users from using it for legitimate purposes.
     
     

    Artificial Intelligence

    Definition:

    AI, or artificial intelligence, refers to the development of computer systems that can perform tasks that would normally require human intelligence, such as recognizing speech, making decisions, and understanding natural language.

    Examples:

    • Virtual assistants: Siri, Alexa, and Google Assistant are examples of virtual assistants that use natural language processing to understand and respond to users’ queries.
    • Recommendation systems: Companies like Netflix and Amazon use AI to recommend movies and products to their users based on their browsing and purchase history.

    Pros :

    • Efficiency: AI systems can work continuously without getting tired or making errors, which can save time and resources.
    • Personalization: AI can help provide personalized recommendations and experiences for users.
    • Automation: AI can automate repetitive and tedious tasks, freeing up time for humans to focus on more complex tasks.

    Cons:

    • Job loss: AI has the potential to automate jobs previously performed by humans, leading to job loss and economic disruption.
    • Bias: AI systems can be biased due to the data they are trained on, leading to unfair or discriminatory outcomes.
    • Safety and privacy concerns: AI systems can pose safety risks if they malfunction or are used maliciously, and can also raise privacy concerns if they collect and use personal data without consent.