KartavyaDesk
news

UPSC Current Affairs Quiz : 24 December 2024

Kartavya Desk Staff

The Current Affairs Quiz 2024 is a daily quiz based on the DAILY CURRENT AFFAIRS AND PIB SUMMARY from the previous day, as posted on our website. It covers all relevant news sources and is designed to test your knowledge of current events. Solving these questions will help you retain both concepts and facts relevant to the UPSC IAS civil services exam.

#### Quiz-summary

0 of 10 questions completed

Questions:

#### Information

Best of luck! 🙂

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

0 of 10 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score |

Your score |

#### Categories

• Not categorized 0%

Pos. | Name | Entered on | Points | Result

Table is loading

No data available

| | | |

• Question 1 of 10 1. Question 1 points What happens if an eavesdropper intercepts a quantum key during transmission? a) The communication speed slows down b) The quantum state remains unaffected c) The quantum state alters, alerting the sender and receiver d) The encryption becomes stronger Correct Solution: c) Quantum Key Distribution (QKD) is a highly secure method of encryption based on the principles of quantum mechanics. When photons are used to transmit a quantum key, they exist in a superposition of states. Any attempt by an eavesdropper to intercept the quantum key introduces a disturbance due to the process of measurement. This is a fundamental principle of quantum mechanics: measuring a quantum state collapses its superposition, altering its original state. If an eavesdropper tries to intercept the key, the quantum state of the photons changes. This alteration is immediately detected by the sender and receiver, as the shared key will show inconsistencies during the verification process. This ability to detect intrusion ensures that QKD is virtually immune to undetected eavesdropping, making it one of the most secure methods for transmitting encryption keys. Incorrect Solution: c) Quantum Key Distribution (QKD) is a highly secure method of encryption based on the principles of quantum mechanics. When photons are used to transmit a quantum key, they exist in a superposition of states. Any attempt by an eavesdropper to intercept the quantum key introduces a disturbance due to the process of measurement. This is a fundamental principle of quantum mechanics: measuring a quantum state collapses its superposition, altering its original state. If an eavesdropper tries to intercept the key, the quantum state of the photons changes. This alteration is immediately detected by the sender and receiver, as the shared key will show inconsistencies during the verification process. This ability to detect intrusion ensures that QKD is virtually immune to undetected eavesdropping, making it one of the most secure methods for transmitting encryption keys.

#### 1. Question

What happens if an eavesdropper intercepts a quantum key during transmission?

• a) The communication speed slows down

• b) The quantum state remains unaffected

• c) The quantum state alters, alerting the sender and receiver

• d) The encryption becomes stronger

Solution: c)

Quantum Key Distribution (QKD) is a highly secure method of encryption based on the principles of quantum mechanics. When photons are used to transmit a quantum key, they exist in a superposition of states. Any attempt by an eavesdropper to intercept the quantum key introduces a disturbance due to the process of measurement. This is a fundamental principle of quantum mechanics: measuring a quantum state collapses its superposition, altering its original state.

If an eavesdropper tries to intercept the key, the quantum state of the photons changes. This alteration is immediately detected by the sender and receiver, as the shared key will show inconsistencies during the verification process. This ability to detect intrusion ensures that QKD is virtually immune to undetected eavesdropping, making it one of the most secure methods for transmitting encryption keys.

Solution: c)

Quantum Key Distribution (QKD) is a highly secure method of encryption based on the principles of quantum mechanics. When photons are used to transmit a quantum key, they exist in a superposition of states. Any attempt by an eavesdropper to intercept the quantum key introduces a disturbance due to the process of measurement. This is a fundamental principle of quantum mechanics: measuring a quantum state collapses its superposition, altering its original state.

If an eavesdropper tries to intercept the key, the quantum state of the photons changes. This alteration is immediately detected by the sender and receiver, as the shared key will show inconsistencies during the verification process. This ability to detect intrusion ensures that QKD is virtually immune to undetected eavesdropping, making it one of the most secure methods for transmitting encryption keys.

• Question 2 of 10 2. Question 1 points Consider the following statements about the United Nations Internal Justice Council (IJC): It operates under the International Court of Justice (ICJ). It recommends candidates for the UN Dispute Tribunal (UNDT) and the UN Appeals Tribunal (UNAT). It monitors the independence and accountability of internal justice mechanisms. How many of the above statements is/are correct? a) Only one b) Only two c) All three d) None Correct Solution: b) Statement 1 is incorrect because the IJC operates under the UN Secretary-General and General Assembly, not the ICJ. About United Nations Internal Justice Council (IJC): Created by the UN General Assembly as part of the reformed internal justice system to uphold accountability, independence, and professionalism. Functions under: Operates under the UN Secretary-General with oversight from the General Assembly. Aim: To strengthen the administration of justice within the UN by ensuring a fair and transparent system for dispute resolution among staff and management. Powers and Functions: Search for Judges: Identifies and interviews candidates for vacancies in the UN Dispute Tribunal (UNDT) and the UN Appeals Tribunal (UNAT). Recommendations: Recommends two or three candidates for each vacancy to the General Assembly, ensuring geographical diversity. Oversight: Provides inputs on the implementation of the justice system to the General Assembly. Independence: Monitors the independence and accountability of internal justice mechanisms. Appointment of Chairperson: Procedure: The Chairperson is selected by consensus from four other members of the Council. Appointed officially by the UN Secretary-General. Term: Four years, with Justice Lokur’s current tenure ending on November 12, 2028. Structure: Total Members: Five members, including: 1 Staff Representative 1 Management Representative 2 Distinguished External Jurists (nominated by staff and management) 1 Chairperson (selected by consensus). Incorrect Solution: b) Statement 1 is incorrect because the IJC operates under the UN Secretary-General and General Assembly, not the ICJ. About United Nations Internal Justice Council (IJC): Created by the UN General Assembly as part of the reformed internal justice system to uphold accountability, independence, and professionalism. Functions under: Operates under the UN Secretary-General with oversight from the General Assembly. Aim: To strengthen the administration of justice within the UN by ensuring a fair and transparent system for dispute resolution among staff and management. Powers and Functions: Search for Judges: Identifies and interviews candidates for vacancies in the UN Dispute Tribunal (UNDT) and the UN Appeals Tribunal (UNAT). Recommendations: Recommends two or three candidates for each vacancy to the General Assembly, ensuring geographical diversity. Oversight: Provides inputs on the implementation of the justice system to the General Assembly. Independence: Monitors the independence and accountability of internal justice mechanisms. Appointment of Chairperson: Procedure: The Chairperson is selected by consensus from four other members of the Council. Appointed officially by the UN Secretary-General. Term: Four years, with Justice Lokur’s current tenure ending on November 12, 2028. Structure: Total Members: Five members, including: 1 Staff Representative 1 Management Representative 2 Distinguished External Jurists (nominated by staff and management) 1 Chairperson (selected by consensus).

#### 2. Question

Consider the following statements about the United Nations Internal Justice Council (IJC):

• It operates under the International Court of Justice (ICJ).

• It recommends candidates for the UN Dispute Tribunal (UNDT) and the UN Appeals Tribunal (UNAT).

• It monitors the independence and accountability of internal justice mechanisms.

How many of the above statements is/are correct?

• a) Only one

• b) Only two

• c) All three

Solution: b)

Statement 1 is incorrect because the IJC operates under the UN Secretary-General and General Assembly, not the ICJ.

About United Nations Internal Justice Council (IJC):

• Created by the UN General Assembly as part of the reformed internal justice system to uphold accountability, independence, and professionalism.

• Functions under: Operates under the UN Secretary-General with oversight from the General Assembly.

• Aim: To strengthen the administration of justice within the UN by ensuring a fair and transparent system for dispute resolution among staff and management.

Powers and Functions:

• Search for Judges: Identifies and interviews candidates for vacancies in the UN Dispute Tribunal (UNDT) and the UN Appeals Tribunal (UNAT).

• Recommendations: Recommends two or three candidates for each vacancy to the General Assembly, ensuring geographical diversity.

• Oversight: Provides inputs on the implementation of the justice system to the General Assembly.

• Independence: Monitors the independence and accountability of internal justice mechanisms.

Appointment of Chairperson:

• Procedure: The Chairperson is selected by consensus from four other members of the Council. Appointed officially by the UN Secretary-General.

• The Chairperson is selected by consensus from four other members of the Council.

• Appointed officially by the UN Secretary-General.

• Term: Four years, with Justice Lokur’s current tenure ending on November 12, 2028.

Structure:

• Total Members: Five members, including: 1 Staff Representative 1 Management Representative 2 Distinguished External Jurists (nominated by staff and management) 1 Chairperson (selected by consensus).

• 1 Staff Representative

• 1 Management Representative

• 2 Distinguished External Jurists (nominated by staff and management)

• 1 Chairperson (selected by consensus).

Solution: b)

Statement 1 is incorrect because the IJC operates under the UN Secretary-General and General Assembly, not the ICJ.

About United Nations Internal Justice Council (IJC):

• Created by the UN General Assembly as part of the reformed internal justice system to uphold accountability, independence, and professionalism.

• Functions under: Operates under the UN Secretary-General with oversight from the General Assembly.

• Aim: To strengthen the administration of justice within the UN by ensuring a fair and transparent system for dispute resolution among staff and management.

Powers and Functions:

• Search for Judges: Identifies and interviews candidates for vacancies in the UN Dispute Tribunal (UNDT) and the UN Appeals Tribunal (UNAT).

• Recommendations: Recommends two or three candidates for each vacancy to the General Assembly, ensuring geographical diversity.

• Oversight: Provides inputs on the implementation of the justice system to the General Assembly.

• Independence: Monitors the independence and accountability of internal justice mechanisms.

Appointment of Chairperson:

• Procedure: The Chairperson is selected by consensus from four other members of the Council. Appointed officially by the UN Secretary-General.

• The Chairperson is selected by consensus from four other members of the Council.

• Appointed officially by the UN Secretary-General.

• Term: Four years, with Justice Lokur’s current tenure ending on November 12, 2028.

Structure:

• Total Members: Five members, including: 1 Staff Representative 1 Management Representative 2 Distinguished External Jurists (nominated by staff and management) 1 Chairperson (selected by consensus).

• 1 Staff Representative

• 1 Management Representative

• 2 Distinguished External Jurists (nominated by staff and management)

• 1 Chairperson (selected by consensus).

• Question 3 of 10 3. Question 1 points Which of the following is the primary purpose of the Starlink Satellite System? a) To enable satellite-based navigation services globally b) To monitor space debris in low Earth orbit c) To provide high-speed internet access globally, especially in remote areas d) To facilitate interplanetary communication Correct Solution: c) About Starlink Satellite System: What is Starlink? Designed by: SpaceX (owned by Elon Musk). Purpose: To provide high-speed, low-latency internet globally, especially in remote and underserved areas. How Starlink Works: Satellite Constellation: Operates using thousands of satellites in low Earth orbit (LEO) (~550 km above Earth). Data Transmission: Satellites communicate with ground stations and user terminals. Use laser links to transmit data efficiently between satellites. User Equipment: Includes a small antenna and router that users install to access the service. Key Features: High-Speed Internet: Speeds often exceed 100 Mbps, suitable for streaming, video calls, and browsing. Low Latency: 20-70 milliseconds. Global Coverage: Particularly effective in remote regions and areas with poor traditional internet infrastructure. Resilient Connectivity: Maintains service during disasters or in areas with restricted internet access. Incorrect Solution: c) About Starlink Satellite System: What is Starlink? Designed by: SpaceX (owned by Elon Musk). Purpose: To provide high-speed, low-latency internet globally, especially in remote and underserved areas. How Starlink Works: Satellite Constellation: Operates using thousands of satellites in low Earth orbit (LEO) (~550 km above Earth). Data Transmission: Satellites communicate with ground stations and user terminals. Use laser links to transmit data efficiently between satellites. User Equipment: Includes a small antenna and router that users install to access the service. Key Features: High-Speed Internet: Speeds often exceed 100 Mbps, suitable for streaming, video calls, and browsing. Low Latency: 20-70 milliseconds. Global Coverage: Particularly effective in remote regions and areas with poor traditional internet infrastructure. Resilient Connectivity: Maintains service during disasters or in areas with restricted internet access.

#### 3. Question

Which of the following is the primary purpose of the Starlink Satellite System?

• a) To enable satellite-based navigation services globally

• b) To monitor space debris in low Earth orbit

• c) To provide high-speed internet access globally, especially in remote areas

• d) To facilitate interplanetary communication

Solution: c)

About Starlink Satellite System:

• What is Starlink?

• Designed by: SpaceX (owned by Elon Musk). Purpose: To provide high-speed, low-latency internet globally, especially in remote and underserved areas.

• Designed by: SpaceX (owned by Elon Musk).

• Purpose: To provide high-speed, low-latency internet globally, especially in remote and underserved areas.

• How Starlink Works:

• Satellite Constellation: Operates using thousands of satellites in low Earth orbit (LEO) (~550 km above Earth). Data Transmission: Satellites communicate with ground stations and user terminals. Use laser links to transmit data efficiently between satellites. User Equipment: Includes a small antenna and router that users install to access the service.

• Satellite Constellation: Operates using thousands of satellites in low Earth orbit (LEO) (~550 km above Earth).

• Data Transmission: Satellites communicate with ground stations and user terminals. Use laser links to transmit data efficiently between satellites.

• Satellites communicate with ground stations and user terminals.

• Use laser links to transmit data efficiently between satellites.

• User Equipment: Includes a small antenna and router that users install to access the service.

• Key Features:

• High-Speed Internet: Speeds often exceed 100 Mbps, suitable for streaming, video calls, and browsing. Low Latency: 20-70 milliseconds. Global Coverage: Particularly effective in remote regions and areas with poor traditional internet infrastructure. Resilient Connectivity: Maintains service during disasters or in areas with restricted internet access.

• High-Speed Internet: Speeds often exceed 100 Mbps, suitable for streaming, video calls, and browsing.

• Low Latency: 20-70 milliseconds.

• Global Coverage: Particularly effective in remote regions and areas with poor traditional internet infrastructure.

• Resilient Connectivity: Maintains service during disasters or in areas with restricted internet access.

Solution: c)

About Starlink Satellite System:

• What is Starlink?

• Designed by: SpaceX (owned by Elon Musk). Purpose: To provide high-speed, low-latency internet globally, especially in remote and underserved areas.

• Designed by: SpaceX (owned by Elon Musk).

• Purpose: To provide high-speed, low-latency internet globally, especially in remote and underserved areas.

• How Starlink Works:

• Satellite Constellation: Operates using thousands of satellites in low Earth orbit (LEO) (~550 km above Earth). Data Transmission: Satellites communicate with ground stations and user terminals. Use laser links to transmit data efficiently between satellites. User Equipment: Includes a small antenna and router that users install to access the service.

• Satellite Constellation: Operates using thousands of satellites in low Earth orbit (LEO) (~550 km above Earth).

• Data Transmission: Satellites communicate with ground stations and user terminals. Use laser links to transmit data efficiently between satellites.

• Satellites communicate with ground stations and user terminals.

• Use laser links to transmit data efficiently between satellites.

• User Equipment: Includes a small antenna and router that users install to access the service.

• Key Features:

• High-Speed Internet: Speeds often exceed 100 Mbps, suitable for streaming, video calls, and browsing. Low Latency: 20-70 milliseconds. Global Coverage: Particularly effective in remote regions and areas with poor traditional internet infrastructure. Resilient Connectivity: Maintains service during disasters or in areas with restricted internet access.

• High-Speed Internet: Speeds often exceed 100 Mbps, suitable for streaming, video calls, and browsing.

• Low Latency: 20-70 milliseconds.

• Global Coverage: Particularly effective in remote regions and areas with poor traditional internet infrastructure.

• Resilient Connectivity: Maintains service during disasters or in areas with restricted internet access.

• Question 4 of 10 4. Question 1 points Which of the following is a limitation of traditional radio wave-based speed guns? a) Beam divergence leads to measuring multiple objects simultaneously b) Inability to measure speed accurately due to Doppler shifts c) Excessive dependency on weather conditions d) Requirement for physical contact with the object Correct Solution: a) Traditional speed guns using radio waves suffer from beam divergence, causing multiple objects to reflect signals and potentially leading to inaccurate measurements. What is a Speed Gun? A device to measure the speed of a moving object without physical contact. Widely used in law enforcement, sports, and industrial applications. How it Works: Utilizes electromagnetic radiation to emit waves towards the moving object. Captures the reflected waves and calculates the speed based on the Doppler effect. Consists of a transmitter, receiver, and processing unit for speed calculation. Incorrect Solution: a) Traditional speed guns using radio waves suffer from beam divergence, causing multiple objects to reflect signals and potentially leading to inaccurate measurements. What is a Speed Gun? A device to measure the speed of a moving object without physical contact. Widely used in law enforcement, sports, and industrial applications. How it Works: Utilizes electromagnetic radiation to emit waves towards the moving object. Captures the reflected waves and calculates the speed based on the Doppler effect. Consists of a transmitter, receiver, and processing unit for speed calculation.

#### 4. Question

Which of the following is a limitation of traditional radio wave-based speed guns?

• a) Beam divergence leads to measuring multiple objects simultaneously

• b) Inability to measure speed accurately due to Doppler shifts

• c) Excessive dependency on weather conditions

• d) Requirement for physical contact with the object

Solution: a)

Traditional speed guns using radio waves suffer from beam divergence, causing multiple objects to reflect signals and potentially leading to inaccurate measurements.

• What is a Speed Gun? A device to measure the speed of a moving object without physical contact. Widely used in law enforcement, sports, and industrial applications.

• A device to measure the speed of a moving object without physical contact.

• Widely used in law enforcement, sports, and industrial applications.

• How it Works: Utilizes electromagnetic radiation to emit waves towards the moving object. Captures the reflected waves and calculates the speed based on the Doppler effect. Consists of a transmitter, receiver, and processing unit for speed calculation.

• Utilizes electromagnetic radiation to emit waves towards the moving object.

• Captures the reflected waves and calculates the speed based on the Doppler effect.

• Consists of a transmitter, receiver, and processing unit for speed calculation.

Solution: a)

Traditional speed guns using radio waves suffer from beam divergence, causing multiple objects to reflect signals and potentially leading to inaccurate measurements.

• What is a Speed Gun? A device to measure the speed of a moving object without physical contact. Widely used in law enforcement, sports, and industrial applications.

• A device to measure the speed of a moving object without physical contact.

• Widely used in law enforcement, sports, and industrial applications.

• How it Works: Utilizes electromagnetic radiation to emit waves towards the moving object. Captures the reflected waves and calculates the speed based on the Doppler effect. Consists of a transmitter, receiver, and processing unit for speed calculation.

• Utilizes electromagnetic radiation to emit waves towards the moving object.

• Captures the reflected waves and calculates the speed based on the Doppler effect.

• Consists of a transmitter, receiver, and processing unit for speed calculation.

• Question 5 of 10 5. Question 1 points What is the primary cause of the Doppler Effect? a) Changes in wave amplitude due to medium resistance b) Reflection of waves from stationary surfaces c) Variation in wave intensity due to distance d) Relative motion between the source and the observer Correct Solution: d) The Doppler Effect arises when there is relative motion between a wave source and an observer. This causes the perceived frequency of the wave to change, appearing higher when approaching and lower when receding. Incorrect Solution: d) The Doppler Effect arises when there is relative motion between a wave source and an observer. This causes the perceived frequency of the wave to change, appearing higher when approaching and lower when receding.

#### 5. Question

What is the primary cause of the Doppler Effect?

• a) Changes in wave amplitude due to medium resistance

• b) Reflection of waves from stationary surfaces

• c) Variation in wave intensity due to distance

• d) Relative motion between the source and the observer

Solution: d)

The Doppler Effect arises when there is relative motion between a wave source and an observer. This causes the perceived frequency of the wave to change, appearing higher when approaching and lower when receding.

Solution: d)

The Doppler Effect arises when there is relative motion between a wave source and an observer. This causes the perceived frequency of the wave to change, appearing higher when approaching and lower when receding.

• Question 6 of 10 6. Question 1 points Consider the following statements: Statement-I: Bio-bitumen is derived from renewable sources like crop stubble and lignin. Statement-II: Bio-bitumen production reduces dependency on fossil fuels and lowers carbon emissions. Which one of the following is correct in respect of the above statements? a) Both Statement-I and Statement-II are correct and Statement-II is the correct explanation for Statement-I b) Both Statement-I and Statement-II are correct and Statement-II is not the correct explanation for Statement-I c) Statement-I is correct but Statement-II is incorrect d) Statement-I is incorrect but Statement-II is correct Correct Solution: a) Bio-bitumen is derived from renewable materials like lignin and crop stubble, making it eco-friendly. Its production reduces dependence on fossil fuels, which are finite resources, and lowers carbon emissions associated with traditional bitumen, aligning with sustainability goals. About Bio-Bitumen: What is Bio-Bitumen? Definition: A sustainable bio-based binder derived from renewable sources like crop stubble, vegetable oils, algae, or lignin. Origin: Primarily extracted from lignocellulosic biomass or refined from residues of crude oil distillation. NH-44 Bio-Bitumen Stretch Nagpur-Mansar Bypass on National Highway 44 in Maharashtra. Production of Bio-Bitumen Primary Source: Lignin, a by-product of agricultural waste and plant-based materials. Process: Biomass is processed to extract lignin, which is converted into bio-bitumen. Incorrect Solution: a) Bio-bitumen is derived from renewable materials like lignin and crop stubble, making it eco-friendly. Its production reduces dependence on fossil fuels, which are finite resources, and lowers carbon emissions associated with traditional bitumen, aligning with sustainability goals. About Bio-Bitumen: What is Bio-Bitumen? Definition: A sustainable bio-based binder derived from renewable sources like crop stubble, vegetable oils, algae, or lignin. Origin: Primarily extracted from lignocellulosic biomass or refined from residues of crude oil distillation. NH-44 Bio-Bitumen Stretch Nagpur-Mansar Bypass on National Highway 44 in Maharashtra. Production of Bio-Bitumen Primary Source: Lignin, a by-product of agricultural waste and plant-based materials. Process: Biomass is processed to extract lignin, which is converted into bio-bitumen.

#### 6. Question

Consider the following statements:

Statement-I: Bio-bitumen is derived from renewable sources like crop stubble and lignin. Statement-II: Bio-bitumen production reduces dependency on fossil fuels and lowers carbon emissions.

Which one of the following is correct in respect of the above statements?

• a) Both Statement-I and Statement-II are correct and Statement-II is the correct explanation for Statement-I

• b) Both Statement-I and Statement-II are correct and Statement-II is not the correct explanation for Statement-I

• c) Statement-I is correct but Statement-II is incorrect

• d) Statement-I is incorrect but Statement-II is correct

Solution: a)

Bio-bitumen is derived from renewable materials like lignin and crop stubble, making it eco-friendly. Its production reduces dependence on fossil fuels, which are finite resources, and lowers carbon emissions associated with traditional bitumen, aligning with sustainability goals.

About Bio-Bitumen:

• What is Bio-Bitumen?

• Definition: A sustainable bio-based binder derived from renewable sources like crop stubble, vegetable oils, algae, or lignin. Origin: Primarily extracted from lignocellulosic biomass or refined from residues of crude oil distillation.

• Definition: A sustainable bio-based binder derived from renewable sources like crop stubble, vegetable oils, algae, or lignin.

• Origin: Primarily extracted from lignocellulosic biomass or refined from residues of crude oil distillation.

• NH-44 Bio-Bitumen Stretch

• Nagpur-Mansar Bypass on National Highway 44 in Maharashtra.

• Nagpur-Mansar Bypass on National Highway 44 in Maharashtra.

• Production of Bio-Bitumen

• Primary Source: Lignin, a by-product of agricultural waste and plant-based materials. Process: Biomass is processed to extract lignin, which is converted into bio-bitumen.

• Primary Source: Lignin, a by-product of agricultural waste and plant-based materials.

• Process: Biomass is processed to extract lignin, which is converted into bio-bitumen.

Solution: a)

Bio-bitumen is derived from renewable materials like lignin and crop stubble, making it eco-friendly. Its production reduces dependence on fossil fuels, which are finite resources, and lowers carbon emissions associated with traditional bitumen, aligning with sustainability goals.

About Bio-Bitumen:

• What is Bio-Bitumen?

• Definition: A sustainable bio-based binder derived from renewable sources like crop stubble, vegetable oils, algae, or lignin. Origin: Primarily extracted from lignocellulosic biomass or refined from residues of crude oil distillation.

• Definition: A sustainable bio-based binder derived from renewable sources like crop stubble, vegetable oils, algae, or lignin.

• Origin: Primarily extracted from lignocellulosic biomass or refined from residues of crude oil distillation.

• NH-44 Bio-Bitumen Stretch

• Nagpur-Mansar Bypass on National Highway 44 in Maharashtra.

• Nagpur-Mansar Bypass on National Highway 44 in Maharashtra.

• Production of Bio-Bitumen

• Primary Source: Lignin, a by-product of agricultural waste and plant-based materials. Process: Biomass is processed to extract lignin, which is converted into bio-bitumen.

• Primary Source: Lignin, a by-product of agricultural waste and plant-based materials.

• Process: Biomass is processed to extract lignin, which is converted into bio-bitumen.

• Question 7 of 10 7. Question 1 points Consider the following statements regarding Conduct of Election Rules. The Conduct of Election Rules, 1961 mandates complete public access to all election-related records. The rules ensure confidentiality of voter identities during elections. Which of the above statements is/are correct? a) 1 only b) 2 only c) Both 1 and 2 d) Neither 1 nor 2 Correct Solution: b) About Conduct of Election Rules, 1961: Aim: To ensure free and fair elections by outlining comprehensive procedures for conducting elections to Parliament and State Legislatures. Key features of the rules: Framework for Elections: Details nomination, polling, counting, and declaration of results under various sections and rules. Public Transparency: As per Rule 93(2)(a) (prior to the amendment), “all papers relating to elections” were open for public inspection. Voter Secrecy: Ensures confidentiality of voters’ identities and actions during elections. Election Officers’ Duties: Specifies roles and responsibilities for polling and returning officers. Resolution of Disputes: Procedures for addressing disputes and complaints during the election process. Recent amendments: Revised Access Clause: Old Version: Allowed public inspection of “all papers relating to elections.” New Version: Limited access to “all other papers as specified in these rules,” excluding electronic records like CCTV footage, webcasting recordings, and video logs. Reason for Amendment: Aimed at preventing potential misuse of electronic records, including risks to voter secrecy and manipulation using artificial intelligence (AI). Retention of Candidate Access: Clause Added: Candidates and their agents retain access to all election records, including electronic materials. Judicial Oversight: Restricted materials can still be accessed by approaching the courts for specific cases. Scope of the Change: Addresses ambiguities in Rule 93 and restricts public inspection of electronic records not explicitly specified, including forms and observer reports. Incorrect Solution: b) About Conduct of Election Rules, 1961: Aim: To ensure free and fair elections by outlining comprehensive procedures for conducting elections to Parliament and State Legislatures. Key features of the rules: Framework for Elections: Details nomination, polling, counting, and declaration of results under various sections and rules. Public Transparency: As per Rule 93(2)(a) (prior to the amendment), “all papers relating to elections” were open for public inspection. Voter Secrecy: Ensures confidentiality of voters’ identities and actions during elections. Election Officers’ Duties: Specifies roles and responsibilities for polling and returning officers. Resolution of Disputes: Procedures for addressing disputes and complaints during the election process. Recent amendments: Revised Access Clause: Old Version: Allowed public inspection of “all papers relating to elections.” New Version: Limited access to “all other papers as specified in these rules,” excluding electronic records like CCTV footage, webcasting recordings, and video logs. Reason for Amendment: Aimed at preventing potential misuse of electronic records, including risks to voter secrecy and manipulation using artificial intelligence (AI). Retention of Candidate Access: Clause Added: Candidates and their agents retain access to all election records, including electronic materials. Judicial Oversight: Restricted materials can still be accessed by approaching the courts for specific cases. Scope of the Change: Addresses ambiguities in Rule 93 and restricts public inspection of electronic records not explicitly specified, including forms and observer reports.

#### 7. Question

Consider the following statements regarding Conduct of Election Rules.

• The Conduct of Election Rules, 1961 mandates complete public access to all election-related records.

• The rules ensure confidentiality of voter identities during elections.

Which of the above statements is/are correct?

• c) Both 1 and 2

• d) Neither 1 nor 2

Solution: b)

About Conduct of Election Rules, 1961:

• Aim: To ensure free and fair elections by outlining comprehensive procedures for conducting elections to Parliament and State Legislatures.

• Key features of the rules:

• Framework for Elections: Details nomination, polling, counting, and declaration of results under various sections and rules. Public Transparency: As per Rule 93(2)(a) (prior to the amendment), “all papers relating to elections” were open for public inspection. Voter Secrecy: Ensures confidentiality of voters’ identities and actions during elections. Election Officers’ Duties: Specifies roles and responsibilities for polling and returning officers. Resolution of Disputes: Procedures for addressing disputes and complaints during the election process.

• Framework for Elections: Details nomination, polling, counting, and declaration of results under various sections and rules.

• Public Transparency: As per Rule 93(2)(a) (prior to the amendment), “all papers relating to elections” were open for public inspection.

• Voter Secrecy: Ensures confidentiality of voters’ identities and actions during elections.

• Election Officers’ Duties: Specifies roles and responsibilities for polling and returning officers.

• Resolution of Disputes: Procedures for addressing disputes and complaints during the election process.

• Recent amendments:

• Revised Access Clause: Old Version: Allowed public inspection of “all papers relating to elections.” New Version: Limited access to “all other papers as specified in these rules,” excluding electronic records like CCTV footage, webcasting recordings, and video logs. Reason for Amendment: Aimed at preventing potential misuse of electronic records, including risks to voter secrecy and manipulation using artificial intelligence (AI). Retention of Candidate Access: Clause Added: Candidates and their agents retain access to all election records, including electronic materials. Judicial Oversight: Restricted materials can still be accessed by approaching the courts for specific cases. Scope of the Change: Addresses ambiguities in Rule 93 and restricts public inspection of electronic records not explicitly specified, including forms and observer reports.

• Revised Access Clause: Old Version: Allowed public inspection of “all papers relating to elections.” New Version: Limited access to “all other papers as specified in these rules,” excluding electronic records like CCTV footage, webcasting recordings, and video logs.

• Old Version: Allowed public inspection of “all papers relating to elections.”

• New Version: Limited access to “all other papers as specified in these rules,” excluding electronic records like CCTV footage, webcasting recordings, and video logs.

• Reason for Amendment: Aimed at preventing potential misuse of electronic records, including risks to voter secrecy and manipulation using artificial intelligence (AI).

• Aimed at preventing potential misuse of electronic records, including risks to voter secrecy and manipulation using artificial intelligence (AI).

• Retention of Candidate Access: Clause Added: Candidates and their agents retain access to all election records, including electronic materials.

• Clause Added: Candidates and their agents retain access to all election records, including electronic materials.

• Judicial Oversight: Restricted materials can still be accessed by approaching the courts for specific cases.

• Scope of the Change: Addresses ambiguities in Rule 93 and restricts public inspection of electronic records not explicitly specified, including forms and observer reports.

Solution: b)

About Conduct of Election Rules, 1961:

• Aim: To ensure free and fair elections by outlining comprehensive procedures for conducting elections to Parliament and State Legislatures.

• Key features of the rules:

• Framework for Elections: Details nomination, polling, counting, and declaration of results under various sections and rules. Public Transparency: As per Rule 93(2)(a) (prior to the amendment), “all papers relating to elections” were open for public inspection. Voter Secrecy: Ensures confidentiality of voters’ identities and actions during elections. Election Officers’ Duties: Specifies roles and responsibilities for polling and returning officers. Resolution of Disputes: Procedures for addressing disputes and complaints during the election process.

• Framework for Elections: Details nomination, polling, counting, and declaration of results under various sections and rules.

• Public Transparency: As per Rule 93(2)(a) (prior to the amendment), “all papers relating to elections” were open for public inspection.

• Voter Secrecy: Ensures confidentiality of voters’ identities and actions during elections.

• Election Officers’ Duties: Specifies roles and responsibilities for polling and returning officers.

• Resolution of Disputes: Procedures for addressing disputes and complaints during the election process.

• Recent amendments:

• Revised Access Clause: Old Version: Allowed public inspection of “all papers relating to elections.” New Version: Limited access to “all other papers as specified in these rules,” excluding electronic records like CCTV footage, webcasting recordings, and video logs. Reason for Amendment: Aimed at preventing potential misuse of electronic records, including risks to voter secrecy and manipulation using artificial intelligence (AI). Retention of Candidate Access: Clause Added: Candidates and their agents retain access to all election records, including electronic materials. Judicial Oversight: Restricted materials can still be accessed by approaching the courts for specific cases. Scope of the Change: Addresses ambiguities in Rule 93 and restricts public inspection of electronic records not explicitly specified, including forms and observer reports.

• Revised Access Clause: Old Version: Allowed public inspection of “all papers relating to elections.” New Version: Limited access to “all other papers as specified in these rules,” excluding electronic records like CCTV footage, webcasting recordings, and video logs.

• Old Version: Allowed public inspection of “all papers relating to elections.”

• New Version: Limited access to “all other papers as specified in these rules,” excluding electronic records like CCTV footage, webcasting recordings, and video logs.

• Reason for Amendment: Aimed at preventing potential misuse of electronic records, including risks to voter secrecy and manipulation using artificial intelligence (AI).

• Aimed at preventing potential misuse of electronic records, including risks to voter secrecy and manipulation using artificial intelligence (AI).

• Retention of Candidate Access: Clause Added: Candidates and their agents retain access to all election records, including electronic materials.

• Clause Added: Candidates and their agents retain access to all election records, including electronic materials.

• Judicial Oversight: Restricted materials can still be accessed by approaching the courts for specific cases.

• Scope of the Change: Addresses ambiguities in Rule 93 and restricts public inspection of electronic records not explicitly specified, including forms and observer reports.

• Question 8 of 10 8. Question 1 points Consider the following statements regarding quantum satellites: They use photons to encode and transmit information. Quantum satellites work exclusively within Earth’s atmosphere. Quantum Entanglement ensures that tampering with data is instantly detected. Which of the above statements are correct? a) 1 and 2 only b) 1, 2, and 3 c) 2 and 3 only d) 1 and 3 only Correct Solution: d) Statement 1 is correct, as photons are used to encode and transmit information. Statement 2 is incorrect because quantum satellites operate beyond Earth’s atmosphere to enable global communication. Statement 3 is correct, as quantum entanglement ensures tampering is instantly detected. About Quantum Satellite: What it is: A quantum satellite is a communication satellite that uses quantum physics principles, such as quantum entanglement and superposition, to enable highly secure data transmission. Science behind its working: Quantum Cryptography: Utilizes quantum principles like entanglement and quantum measurement to secure data. Quantum Key Distribution (QKD): Ensures encryption keys are shared securely between parties. Any eavesdropping alters the quantum state, alerting users. Photon Transmission: Encodes information in photons, which are transmitted through free space or fibre-optic cables. Features: Quantum Key Distribution (QKD): Facilitates secure encryption key exchanges. Quantum Entanglement: Ensures instantaneous detection of tampering. High-Speed Communication: Enhanced data security without sacrificing speed. Global Reach: Enables long-distance secure communication through satellite-ground systems. Incorrect Solution: d) Statement 1 is correct, as photons are used to encode and transmit information. Statement 2 is incorrect because quantum satellites operate beyond Earth’s atmosphere to enable global communication. Statement 3 is correct, as quantum entanglement ensures tampering is instantly detected. About Quantum Satellite: What it is: A quantum satellite is a communication satellite that uses quantum physics principles, such as quantum entanglement and superposition, to enable highly secure data transmission. Science behind its working: Quantum Cryptography: Utilizes quantum principles like entanglement and quantum measurement to secure data. Quantum Key Distribution (QKD): Ensures encryption keys are shared securely between parties. Any eavesdropping alters the quantum state, alerting users. Photon Transmission: Encodes information in photons, which are transmitted through free space or fibre-optic cables. Features: Quantum Key Distribution (QKD): Facilitates secure encryption key exchanges. Quantum Entanglement: Ensures instantaneous detection of tampering. High-Speed Communication: Enhanced data security without sacrificing speed. Global Reach: Enables long-distance secure communication through satellite-ground systems.

#### 8. Question

Consider the following statements regarding quantum satellites:

• They use photons to encode and transmit information. Quantum satellites work exclusively within Earth’s atmosphere. Quantum Entanglement ensures that tampering with data is instantly detected.

• They use photons to encode and transmit information.

• Quantum satellites work exclusively within Earth’s atmosphere.

• Quantum Entanglement ensures that tampering with data is instantly detected.

Which of the above statements are correct?

• a) 1 and 2 only

• b) 1, 2, and 3

• c) 2 and 3 only

• d) 1 and 3 only

Solution: d)

Statement 1 is correct, as photons are used to encode and transmit information. Statement 2 is incorrect because quantum satellites operate beyond Earth’s atmosphere to enable global communication. Statement 3 is correct, as quantum entanglement ensures tampering is instantly detected.

About Quantum Satellite:

• What it is:

• A quantum satellite is a communication satellite that uses quantum physics principles, such as quantum entanglement and superposition, to enable highly secure data transmission.

• A quantum satellite is a communication satellite that uses quantum physics principles, such as quantum entanglement and superposition, to enable highly secure data transmission.

• Science behind its working:

• Quantum Cryptography: Utilizes quantum principles like entanglement and quantum measurement to secure data. Quantum Key Distribution (QKD): Ensures encryption keys are shared securely between parties. Any eavesdropping alters the quantum state, alerting users. Photon Transmission: Encodes information in photons, which are transmitted through free space or fibre-optic cables.

• Quantum Cryptography: Utilizes quantum principles like entanglement and quantum measurement to secure data.

• Quantum Key Distribution (QKD): Ensures encryption keys are shared securely between parties. Any eavesdropping alters the quantum state, alerting users.

• Photon Transmission: Encodes information in photons, which are transmitted through free space or fibre-optic cables.

• Quantum Key Distribution (QKD): Facilitates secure encryption key exchanges. Quantum Entanglement: Ensures instantaneous detection of tampering. High-Speed Communication: Enhanced data security without sacrificing speed. Global Reach: Enables long-distance secure communication through satellite-ground systems.

• Quantum Key Distribution (QKD): Facilitates secure encryption key exchanges.

• Quantum Entanglement: Ensures instantaneous detection of tampering.

• High-Speed Communication: Enhanced data security without sacrificing speed.

• Global Reach: Enables long-distance secure communication through satellite-ground systems.

Solution: d)

Statement 1 is correct, as photons are used to encode and transmit information. Statement 2 is incorrect because quantum satellites operate beyond Earth’s atmosphere to enable global communication. Statement 3 is correct, as quantum entanglement ensures tampering is instantly detected.

About Quantum Satellite:

• What it is:

• A quantum satellite is a communication satellite that uses quantum physics principles, such as quantum entanglement and superposition, to enable highly secure data transmission.

• A quantum satellite is a communication satellite that uses quantum physics principles, such as quantum entanglement and superposition, to enable highly secure data transmission.

• Science behind its working:

• Quantum Cryptography: Utilizes quantum principles like entanglement and quantum measurement to secure data. Quantum Key Distribution (QKD): Ensures encryption keys are shared securely between parties. Any eavesdropping alters the quantum state, alerting users. Photon Transmission: Encodes information in photons, which are transmitted through free space or fibre-optic cables.

• Quantum Cryptography: Utilizes quantum principles like entanglement and quantum measurement to secure data.

• Quantum Key Distribution (QKD): Ensures encryption keys are shared securely between parties. Any eavesdropping alters the quantum state, alerting users.

• Photon Transmission: Encodes information in photons, which are transmitted through free space or fibre-optic cables.

• Quantum Key Distribution (QKD): Facilitates secure encryption key exchanges. Quantum Entanglement: Ensures instantaneous detection of tampering. High-Speed Communication: Enhanced data security without sacrificing speed. Global Reach: Enables long-distance secure communication through satellite-ground systems.

• Quantum Key Distribution (QKD): Facilitates secure encryption key exchanges.

• Quantum Entanglement: Ensures instantaneous detection of tampering.

• High-Speed Communication: Enhanced data security without sacrificing speed.

• Global Reach: Enables long-distance secure communication through satellite-ground systems.

• Question 9 of 10 9. Question 1 points Consider the following statements regarding the advantages of quantum satellites: They offer enhanced security by being virtually immune to hacking. Quantum satellites can replace classical cryptographic systems completely. They have strategic applications in defence, banking, and government communication. Which of the above statements are correct? a) 1 and 2 only b) 1 and 3 only c) 2 and 3 only d) 1, 2, and 3 Correct Solution: b) Statement 1 is correct as quantum satellites provide high levels of security. Statement 3 is correct since their secure communication benefits sectors like defence and banking. Statement 2 is incorrect because quantum satellites complement, rather than fully replace, classical cryptographic systems. Advantages: Enhanced Security: Virtually immune to hacking due to quantum measurement principles. Future-Proof Encryption: Counters threats posed by quantum computers to classical cryptographic systems. Strategic Applications: Useful in defence, banking, and secure government communications. Technological Leadership: Positions India as a global leader in quantum technologies. Limitations: High Costs: Development, deployment, and maintenance are resource-intensive. Distance Challenges: Signal loss over long distances due to atmospheric and technical constraints. Denial-of-Service Risks: Eavesdroppers can disrupt transmissions without stealing data. Hardware Limitations: Difficult to upgrade or patch quantum hardware. Incorrect Solution: b) Statement 1 is correct as quantum satellites provide high levels of security. Statement 3 is correct since their secure communication benefits sectors like defence and banking. Statement 2 is incorrect because quantum satellites complement, rather than fully replace, classical cryptographic systems. Advantages: Enhanced Security: Virtually immune to hacking due to quantum measurement principles. Future-Proof Encryption: Counters threats posed by quantum computers to classical cryptographic systems. Strategic Applications: Useful in defence, banking, and secure government communications. Technological Leadership: Positions India as a global leader in quantum technologies. Limitations: High Costs: Development, deployment, and maintenance are resource-intensive. Distance Challenges: Signal loss over long distances due to atmospheric and technical constraints. Denial-of-Service Risks: Eavesdroppers can disrupt transmissions without stealing data. Hardware Limitations: Difficult to upgrade or patch quantum hardware.

#### 9. Question

Consider the following statements regarding the advantages of quantum satellites:

• They offer enhanced security by being virtually immune to hacking.

• Quantum satellites can replace classical cryptographic systems completely.

• They have strategic applications in defence, banking, and government communication.

Which of the above statements are correct?

• a) 1 and 2 only

• b) 1 and 3 only

• c) 2 and 3 only

• d) 1, 2, and 3

Solution: b)

Statement 1 is correct as quantum satellites provide high levels of security. Statement 3 is correct since their secure communication benefits sectors like defence and banking. Statement 2 is incorrect because quantum satellites complement, rather than fully replace, classical cryptographic systems.

• Advantages:

• Enhanced Security: Virtually immune to hacking due to quantum measurement principles. Future-Proof Encryption: Counters threats posed by quantum computers to classical cryptographic systems. Strategic Applications: Useful in defence, banking, and secure government communications. Technological Leadership: Positions India as a global leader in quantum technologies.

• Enhanced Security: Virtually immune to hacking due to quantum measurement principles.

• Future-Proof Encryption: Counters threats posed by quantum computers to classical cryptographic systems.

• Strategic Applications: Useful in defence, banking, and secure government communications.

• Technological Leadership: Positions India as a global leader in quantum technologies.

• Limitations:

• High Costs: Development, deployment, and maintenance are resource-intensive. Distance Challenges: Signal loss over long distances due to atmospheric and technical constraints. Denial-of-Service Risks: Eavesdroppers can disrupt transmissions without stealing data. Hardware Limitations: Difficult to upgrade or patch quantum hardware.

• High Costs: Development, deployment, and maintenance are resource-intensive.

• Distance Challenges: Signal loss over long distances due to atmospheric and technical constraints.

• Denial-of-Service Risks: Eavesdroppers can disrupt transmissions without stealing data.

• Hardware Limitations: Difficult to upgrade or patch quantum hardware.

Solution: b)

Statement 1 is correct as quantum satellites provide high levels of security. Statement 3 is correct since their secure communication benefits sectors like defence and banking. Statement 2 is incorrect because quantum satellites complement, rather than fully replace, classical cryptographic systems.

• Advantages:

• Enhanced Security: Virtually immune to hacking due to quantum measurement principles. Future-Proof Encryption: Counters threats posed by quantum computers to classical cryptographic systems. Strategic Applications: Useful in defence, banking, and secure government communications. Technological Leadership: Positions India as a global leader in quantum technologies.

• Enhanced Security: Virtually immune to hacking due to quantum measurement principles.

• Future-Proof Encryption: Counters threats posed by quantum computers to classical cryptographic systems.

• Strategic Applications: Useful in defence, banking, and secure government communications.

• Technological Leadership: Positions India as a global leader in quantum technologies.

• Limitations:

• High Costs: Development, deployment, and maintenance are resource-intensive. Distance Challenges: Signal loss over long distances due to atmospheric and technical constraints. Denial-of-Service Risks: Eavesdroppers can disrupt transmissions without stealing data. Hardware Limitations: Difficult to upgrade or patch quantum hardware.

• High Costs: Development, deployment, and maintenance are resource-intensive.

• Distance Challenges: Signal loss over long distances due to atmospheric and technical constraints.

• Denial-of-Service Risks: Eavesdroppers can disrupt transmissions without stealing data.

• Hardware Limitations: Difficult to upgrade or patch quantum hardware.

• Question 10 of 10 10. Question 1 points Consider the following statements regarding Characteristics of Bio-Bitumen. Bio-bitumen cannot replace petroleum bitumen in road construction. Bio-bitumen is not suitable for industrial applications like waterproofing. Bio-bitumen does not support sustainability as it relies on synthetic materials. How many of the above statements is/are correct? a) Only one b) Only two c) All three d) None Correct Solution: d) Statement 1 is incorrect because bio-bitumen is a direct replacement for petroleum-based bitumen in asphalt pavements, making it highly suitable for road construction. Statement 2 is incorrect as bio-bitumen is applicable in industrial uses, such as waterproofing and adhesive materials. Statement 3 is incorrect since bio-bitumen promotes sustainability by utilizing agricultural residues and reducing stubble burning, thereby lowering environmental impact. Characteristics of Bio-Bitumen Eco-Friendly: Reduces greenhouse gas emissions by 70% compared to petroleum-based bitumen. Strength: Offers superior durability and load-bearing capacity. Bio-bitumen is 40% stronger than conventional asphalt. Sustainability: Promotes the use of agricultural residues, reducing stubble burning. Applications of Bio-Bitumen Road Construction: Direct replacement for petroleum bitumen in asphalt pavements. Modifier: Enhances traditional bitumen properties. Rejuvenator: Restores aged asphalt’s elasticity and functionality. Industrial Use: Applicable in waterproofing and adhesive materials. Incorrect Solution: d) Statement 1 is incorrect because bio-bitumen is a direct replacement for petroleum-based bitumen in asphalt pavements, making it highly suitable for road construction. Statement 2 is incorrect as bio-bitumen is applicable in industrial uses, such as waterproofing and adhesive materials. Statement 3 is incorrect since bio-bitumen promotes sustainability by utilizing agricultural residues and reducing stubble burning, thereby lowering environmental impact. Characteristics of Bio-Bitumen Eco-Friendly: Reduces greenhouse gas emissions by 70% compared to petroleum-based bitumen. Strength: Offers superior durability and load-bearing capacity. Bio-bitumen is 40% stronger than conventional asphalt. Sustainability: Promotes the use of agricultural residues, reducing stubble burning. Applications of Bio-Bitumen Road Construction: Direct replacement for petroleum bitumen in asphalt pavements. Modifier: Enhances traditional bitumen properties. Rejuvenator: Restores aged asphalt’s elasticity and functionality. Industrial Use: Applicable in waterproofing and adhesive materials.

#### 10. Question

Consider the following statements regarding Characteristics of Bio-Bitumen.

• Bio-bitumen cannot replace petroleum bitumen in road construction.

• Bio-bitumen is not suitable for industrial applications like waterproofing.

• Bio-bitumen does not support sustainability as it relies on synthetic materials.

How many of the above statements is/are correct?

• a) Only one

• b) Only two

• c) All three

Solution: d)

Statement 1 is incorrect because bio-bitumen is a direct replacement for petroleum-based bitumen in asphalt pavements, making it highly suitable for road construction.

Statement 2 is incorrect as bio-bitumen is applicable in industrial uses, such as waterproofing and adhesive materials.

Statement 3 is incorrect since bio-bitumen promotes sustainability by utilizing agricultural residues and reducing stubble burning, thereby lowering environmental impact.

Characteristics of Bio-Bitumen

• Eco-Friendly: Reduces greenhouse gas emissions by 70% compared to petroleum-based bitumen. Strength: Offers superior durability and load-bearing capacity. Bio-bitumen is 40% stronger than conventional asphalt. Sustainability: Promotes the use of agricultural residues, reducing stubble burning.

• Eco-Friendly: Reduces greenhouse gas emissions by 70% compared to petroleum-based bitumen.

• Strength: Offers superior durability and load-bearing capacity. Bio-bitumen is 40% stronger than conventional asphalt.

• Bio-bitumen is 40% stronger than conventional asphalt.

• Sustainability: Promotes the use of agricultural residues, reducing stubble burning.

• Applications of Bio-Bitumen

• Road Construction: Direct replacement for petroleum bitumen in asphalt pavements. Modifier: Enhances traditional bitumen properties. Rejuvenator: Restores aged asphalt’s elasticity and functionality. Industrial Use: Applicable in waterproofing and adhesive materials.

• Road Construction: Direct replacement for petroleum bitumen in asphalt pavements.

• Modifier: Enhances traditional bitumen properties.

• Rejuvenator: Restores aged asphalt’s elasticity and functionality.

• Industrial Use: Applicable in waterproofing and adhesive materials.

Solution: d)

Statement 1 is incorrect because bio-bitumen is a direct replacement for petroleum-based bitumen in asphalt pavements, making it highly suitable for road construction.

Statement 2 is incorrect as bio-bitumen is applicable in industrial uses, such as waterproofing and adhesive materials.

Statement 3 is incorrect since bio-bitumen promotes sustainability by utilizing agricultural residues and reducing stubble burning, thereby lowering environmental impact.

Characteristics of Bio-Bitumen

• Eco-Friendly: Reduces greenhouse gas emissions by 70% compared to petroleum-based bitumen. Strength: Offers superior durability and load-bearing capacity. Bio-bitumen is 40% stronger than conventional asphalt. Sustainability: Promotes the use of agricultural residues, reducing stubble burning.

• Eco-Friendly: Reduces greenhouse gas emissions by 70% compared to petroleum-based bitumen.

• Strength: Offers superior durability and load-bearing capacity. Bio-bitumen is 40% stronger than conventional asphalt.

• Bio-bitumen is 40% stronger than conventional asphalt.

• Sustainability: Promotes the use of agricultural residues, reducing stubble burning.

• Applications of Bio-Bitumen

• Road Construction: Direct replacement for petroleum bitumen in asphalt pavements. Modifier: Enhances traditional bitumen properties. Rejuvenator: Restores aged asphalt’s elasticity and functionality. Industrial Use: Applicable in waterproofing and adhesive materials.

• Road Construction: Direct replacement for petroleum bitumen in asphalt pavements.

• Modifier: Enhances traditional bitumen properties.

• Rejuvenator: Restores aged asphalt’s elasticity and functionality.

• Industrial Use: Applicable in waterproofing and adhesive materials.

Join our Official Telegram Channel HERE for Motivation and Fast Updates for

Join our Twitter Channel HERE

Follow our Instagram Channel HERE

AI-assisted content, editorially reviewed by Kartavya Desk Staff.

About Kartavya Desk Staff

Articles in our archive published before our editorial team was expanded. Legacy content is periodically reviewed and updated by our current editors.

All News