SOCIOLOGY PAPER II

Odisha Civil Services Mains 2024

Time: 3 Hours
|Full Marks: 250

GROUP A

10 × 15 MARKS

Instructions: Attempt 10 (ten) questions. Word limit: 250 words.
  1. Write on different types of marriage payments across diverse groups in India.
  2. Discuss Prof. F. G. Bailey’s two principles of caste dynamics and identity. How is caste hierarchy expressed in the rules of interaction?
  3. “Cultural diversity in India has contributed to dynamic culture, architecture and literature.” Justify.
  4. What are the social consequences of land reforms and green revolution in Indian social system?
  5. What are the issues of education among the disadvantaged groups in India?
  6. Bring out the peculiar features of traditional Hindu Social Organization.
  7. Bring out the key differences between G. S. Ghurye and Verrier Elwin on tribal development in India. Whom do you support and why?
  8. To what an extent has mass media led to modernization of Indian society? Has there been any resistance too?
  9. How has the west impacted the traditional Hindu Social Organization?
  10. What are the determinants of population growth?
  11. Write a note on the exogenous sources of social change.
  12. What are the current status of maternal and infant mortality rate in Odisha?

GROUP B

05 × 20 MARKS

Instructions: Attempt 05 (five) questions. Word limit: 300 words.
  1. “Knowledge of traditional social systems can promote social justice and social reforms in India.” Discuss.
  2. How has the Indian democracy been influenced by social and structural factors, especially in terms of political elites? Discuss.
  3. Write on roles of pressure groups in contemporary political economy in India.
  4. What is indebtedness? Is it a major social issue in India?
  5. Has ‘development’ helped in containing gender violence and dowry? Support your argument with appropriate examples.
  6. What do you mean by Dalit consciousness? How has it transformed the interface between caste and politics in India?

UPSCTREE • OCS Exam Preparation

 

Share is Caring, Choose Your Platform!

Receive Daily Updates

Stay updated with current events, tests, material and UPSC related news

Recent Posts

  • Darknet

    Definition:

    Darknet, also known as dark web or darknet market, refers to the part of the internet that is not indexed or accessible through traditional search engines. It is a network of private and encrypted websites that cannot be accessed through regular web browsers and requires special software and configuration to access.

    The darknet is often associated with illegal activities such as drug trafficking, weapon sales, and hacking services, although not all sites on the darknet are illegal.

    Examples:

    Examples of darknet markets include Silk Road, AlphaBay, and Dream Market, which were all shut down by law enforcement agencies in recent years.

    These marketplaces operate similarly to e-commerce websites, with vendors selling various illegal goods and services, such as drugs, counterfeit documents, and hacking tools, and buyers paying with cryptocurrency for their purchases.

    Pros :

    • Anonymity: Darknet allows users to communicate and transact with each other anonymously. Users can maintain their privacy and avoid being tracked by law enforcement agencies or other entities.
    • Access to Information: The darknet provides access to information and resources that may be otherwise unavailable or censored on the regular internet. This can include political or sensitive information that is not allowed to be disseminated through other channels.
    • Freedom of Speech: The darknet can be a platform for free speech, as users are able to express their opinions and ideas without fear of censorship or retribution.
    • Secure Communication: Darknet sites are encrypted, which means that communication between users is secure and cannot be intercepted by third parties.
    •  

    Cons:

    • Illegal Activities: Many darknet sites are associated with illegal activities, such as drug trafficking, weapon sales, and hacking services. Such activities can attract criminals and expose users to serious legal risks.
    • Scams: The darknet is a hotbed for scams, with many fake vendors and websites that aim to steal users’ personal information and cryptocurrency. The lack of regulation and oversight on the darknet means that users must be cautious when conducting transactions.
    • Security Risks: The use of the darknet can expose users to malware and other security risks, as many sites are not properly secured or monitored. Users may also be vulnerable to hacking or phishing attacks.
    • Stigma: The association of the darknet with illegal activities has created a stigma that may deter some users from using it for legitimate purposes.
     
     

    Artificial Intelligence

    Definition:

    AI, or artificial intelligence, refers to the development of computer systems that can perform tasks that would normally require human intelligence, such as recognizing speech, making decisions, and understanding natural language.

    Examples:

    • Virtual assistants: Siri, Alexa, and Google Assistant are examples of virtual assistants that use natural language processing to understand and respond to users’ queries.
    • Recommendation systems: Companies like Netflix and Amazon use AI to recommend movies and products to their users based on their browsing and purchase history.

    Pros :

    • Efficiency: AI systems can work continuously without getting tired or making errors, which can save time and resources.
    • Personalization: AI can help provide personalized recommendations and experiences for users.
    • Automation: AI can automate repetitive and tedious tasks, freeing up time for humans to focus on more complex tasks.

    Cons:

    • Job loss: AI has the potential to automate jobs previously performed by humans, leading to job loss and economic disruption.
    • Bias: AI systems can be biased due to the data they are trained on, leading to unfair or discriminatory outcomes.
    • Safety and privacy concerns: AI systems can pose safety risks if they malfunction or are used maliciously, and can also raise privacy concerns if they collect and use personal data without consent.