UPSC Editorials Quiz : 3 May 2025
Kartavya Desk Staff
Introducing QUED – Questions from Editorials (UPSC Editorials Quiz) , an innovative initiative from InsightsIAS. Considering the significant number of questions in previous UPSC Prelims from editorials, practicing MCQs from this perspective can provide an extra edge. While we cover important editorials separately in our Editorial Section and SECURE Initiative, adding QUED (UPSC Editorials Quiz) to your daily MCQ practice alongside Static Quiz, Current Affairs Quiz, and InstaDART can be crucial for better performance. We recommend utilizing this initiative to enhance your preparation, with 5 MCQs posted daily at 11 am from Monday to Saturday on our website under the QUIZ menu.
#### Quiz-summary
0 of 5 questions completed
Questions:
#### Information
Best of luck! 🙂
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
0 of 5 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
#### Categories
• Not categorized 0%
• Question 1 of 5 1. Question Consider the following statements regarding No Money for Terror (NMFT)’s role in countering financial crimes: The NMFT framework replaces the Financial Action Task Force (FATF) as the primary global regulator against terror financing. It imposes sanctions on non-compliant nations that fail to control financial terrorism. The NMFT agreement mandates all participants to share real-time financial intelligence data on terrorist networks. How many of the above statements are correct? a) Only one b) Only two c) All three d) None Correct Solution: d) Statement 1 is incorrect – NMFT does not replace FATF; rather, it supports and complements FATF guidelines. Statement 2 is incorrect – NMFT does not impose sanctions; sanctions are primarily handled by FATF, UN Security Council, and national authorities. Statement 3 is incorrect – The conference encourages financial intelligence sharing, but it does not mandate real-time data sharing. About No Money for Terror (NMFT) Conference: What is NMFT? A global ministerial-level initiative aimed at combating terrorist financing. Platform for intelligence sharing, legal cooperation, and policy formulation against terror funding. Established in: 2018, first held in Paris. Under control of: Financial Action Task Force (FATF) & UN Counter-Terrorism Bodies. Aim: Disrupt financial networks of terrorist organizations. Strengthen global financial monitoring and regulatory frameworks. Facilitate international cooperation in countering terror financing. Functions & Features: Intelligence Sharing: Enhances real-time data exchange on financial transactions linked to terrorism. Legal Reforms & Regulations: Encourages nations to update counter-terrorism laws and financial tracking systems. Monitoring Digital Transactions: Addresses cryptocurrency risks, online crowdfunding, and emerging terror financing methods. Strengthening Banking & Financial Oversight: Works with banks, fintech companies, and financial intelligence units to detect suspicious transactions. Capacity Building: Provides training, technical expertise, and resources to nations for effective counter-terrorism operations. Incorrect Solution: d) Statement 1 is incorrect – NMFT does not replace FATF; rather, it supports and complements FATF guidelines. Statement 2 is incorrect – NMFT does not impose sanctions; sanctions are primarily handled by FATF, UN Security Council, and national authorities. Statement 3 is incorrect – The conference encourages financial intelligence sharing, but it does not mandate real-time data sharing. About No Money for Terror (NMFT) Conference: What is NMFT? A global ministerial-level initiative aimed at combating terrorist financing. Platform for intelligence sharing, legal cooperation, and policy formulation against terror funding. Established in: 2018, first held in Paris. Under control of: Financial Action Task Force (FATF) & UN Counter-Terrorism Bodies. Aim: Disrupt financial networks of terrorist organizations. Strengthen global financial monitoring and regulatory frameworks. Facilitate international cooperation in countering terror financing. Functions & Features: Intelligence Sharing: Enhances real-time data exchange on financial transactions linked to terrorism. Legal Reforms & Regulations: Encourages nations to update counter-terrorism laws and financial tracking systems. Monitoring Digital Transactions: Addresses cryptocurrency risks, online crowdfunding, and emerging terror financing methods. Strengthening Banking & Financial Oversight: Works with banks, fintech companies, and financial intelligence units to detect suspicious transactions. Capacity Building: Provides training, technical expertise, and resources to nations for effective counter-terrorism operations.
#### 1. Question
Consider the following statements regarding No Money for Terror (NMFT)’s role in countering financial crimes:
• The NMFT framework replaces the Financial Action Task Force (FATF) as the primary global regulator against terror financing.
• It imposes sanctions on non-compliant nations that fail to control financial terrorism.
• The NMFT agreement mandates all participants to share real-time financial intelligence data on terrorist networks.
How many of the above statements are correct?
• a) Only one
• b) Only two
• c) All three
Solution: d)
• Statement 1 is incorrect – NMFT does not replace FATF; rather, it supports and complements FATF guidelines.
• Statement 2 is incorrect – NMFT does not impose sanctions; sanctions are primarily handled by FATF, UN Security Council, and national authorities.
• Statement 3 is incorrect – The conference encourages financial intelligence sharing, but it does not mandate real-time data sharing.
About No Money for Terror (NMFT) Conference:
• What is NMFT?
• A global ministerial-level initiative aimed at combating terrorist financing. Platform for intelligence sharing, legal cooperation, and policy formulation against terror funding.
• A global ministerial-level initiative aimed at combating terrorist financing.
• Platform for intelligence sharing, legal cooperation, and policy formulation against terror funding.
• Established in: 2018, first held in Paris.
• Under control of: Financial Action Task Force (FATF) & UN Counter-Terrorism Bodies.
• Disrupt financial networks of terrorist organizations. Strengthen global financial monitoring and regulatory frameworks. Facilitate international cooperation in countering terror financing.
• Disrupt financial networks of terrorist organizations.
• Strengthen global financial monitoring and regulatory frameworks.
• Facilitate international cooperation in countering terror financing.
• Functions & Features: Intelligence Sharing: Enhances real-time data exchange on financial transactions linked to terrorism. Legal Reforms & Regulations: Encourages nations to update counter-terrorism laws and financial tracking systems. Monitoring Digital Transactions: Addresses cryptocurrency risks, online crowdfunding, and emerging terror financing methods. Strengthening Banking & Financial Oversight: Works with banks, fintech companies, and financial intelligence units to detect suspicious transactions. Capacity Building: Provides training, technical expertise, and resources to nations for effective counter-terrorism operations.
• Intelligence Sharing: Enhances real-time data exchange on financial transactions linked to terrorism.
• Legal Reforms & Regulations: Encourages nations to update counter-terrorism laws and financial tracking systems.
• Monitoring Digital Transactions: Addresses cryptocurrency risks, online crowdfunding, and emerging terror financing methods.
• Strengthening Banking & Financial Oversight: Works with banks, fintech companies, and financial intelligence units to detect suspicious transactions.
• Capacity Building: Provides training, technical expertise, and resources to nations for effective counter-terrorism operations.
Solution: d)
• Statement 1 is incorrect – NMFT does not replace FATF; rather, it supports and complements FATF guidelines.
• Statement 2 is incorrect – NMFT does not impose sanctions; sanctions are primarily handled by FATF, UN Security Council, and national authorities.
• Statement 3 is incorrect – The conference encourages financial intelligence sharing, but it does not mandate real-time data sharing.
About No Money for Terror (NMFT) Conference:
• What is NMFT?
• A global ministerial-level initiative aimed at combating terrorist financing. Platform for intelligence sharing, legal cooperation, and policy formulation against terror funding.
• A global ministerial-level initiative aimed at combating terrorist financing.
• Platform for intelligence sharing, legal cooperation, and policy formulation against terror funding.
• Established in: 2018, first held in Paris.
• Under control of: Financial Action Task Force (FATF) & UN Counter-Terrorism Bodies.
• Disrupt financial networks of terrorist organizations. Strengthen global financial monitoring and regulatory frameworks. Facilitate international cooperation in countering terror financing.
• Disrupt financial networks of terrorist organizations.
• Strengthen global financial monitoring and regulatory frameworks.
• Facilitate international cooperation in countering terror financing.
• Functions & Features: Intelligence Sharing: Enhances real-time data exchange on financial transactions linked to terrorism. Legal Reforms & Regulations: Encourages nations to update counter-terrorism laws and financial tracking systems. Monitoring Digital Transactions: Addresses cryptocurrency risks, online crowdfunding, and emerging terror financing methods. Strengthening Banking & Financial Oversight: Works with banks, fintech companies, and financial intelligence units to detect suspicious transactions. Capacity Building: Provides training, technical expertise, and resources to nations for effective counter-terrorism operations.
• Intelligence Sharing: Enhances real-time data exchange on financial transactions linked to terrorism.
• Legal Reforms & Regulations: Encourages nations to update counter-terrorism laws and financial tracking systems.
• Monitoring Digital Transactions: Addresses cryptocurrency risks, online crowdfunding, and emerging terror financing methods.
• Strengthening Banking & Financial Oversight: Works with banks, fintech companies, and financial intelligence units to detect suspicious transactions.
• Capacity Building: Provides training, technical expertise, and resources to nations for effective counter-terrorism operations.
• Question 2 of 5 2. Question Consider the following statements regarding the IT Act, 2000: It provides legal recognition for electronic contracts and digital signatures. It grants absolute immunity to intermediaries for third-party content under all conditions. It empowers CERT-In to handle cybersecurity threats and incidents. How many of the above statements is/are correct? (a) Only one (b) Only two (c) All three (d) None Correct Solution: b) Statements 1 and 3 are correct. The IT Act, 2000 was instrumental in giving legal recognition to digital documents, electronic contracts, and digital signatures, thus enabling the growth of e-commerce and online governance. Statement 3 is also correct — the Act recognizes the Indian Computer Emergency Response Team (CERT-In) as the national agency for cybersecurity. It is empowered to monitor, prevent, and respond to cyber incidents and is also authorized to request logs and other technical data. Statement 2 is incorrect — Section 79 provides conditional immunity. Intermediaries must take down content when legally notified. Failure to do so removes this protection. About Information Technology (IT) Act, 2000: What it is: The IT Act 2000 is India’s primary law governing cyber activities, digital transactions, and electronic governance. It provides a legal framework for cybersecurity, digital signatures, data protection, and penalties for cyber offenses. Aim of the act: Facilitate secure electronic communication and commerce. Ensure penalties for cybercrimes and protection of user data. Foster innovation and trust in the Indian IT and digital ecosystem. Key Features: Legal recognition of electronic records and digital signatures. Defines liabilities and protections for intermediaries. Empowers the Central Government and CERT-In for cybersecurity regulation. Amended in 2008 and 2015 to address evolving cyber challenges. Key Provisions in News: Section 69A of IT Act, 2000: Empowers the government to block public access to online information in interest of sovereignty, security, public order, or prevention of incitement. Requires written orders and procedural safeguards, upheld in the Shreya Singhal vs Union of India (2015) verdict. Section 79 of IT Act, 2000: Provides conditional immunity to intermediaries for third-party content. Under Section 79(3)(b), intermediaries must remove unlawful content when notified by the government or lose immunity. Does not authorize direct blocking orders; only notifies intermediaries of liability. Incorrect Solution: b) Statements 1 and 3 are correct. The IT Act, 2000 was instrumental in giving legal recognition to digital documents, electronic contracts, and digital signatures, thus enabling the growth of e-commerce and online governance. Statement 3 is also correct — the Act recognizes the Indian Computer Emergency Response Team (CERT-In) as the national agency for cybersecurity. It is empowered to monitor, prevent, and respond to cyber incidents and is also authorized to request logs and other technical data. Statement 2 is incorrect — Section 79 provides conditional immunity. Intermediaries must take down content when legally notified. Failure to do so removes this protection. About Information Technology (IT) Act, 2000: What it is: The IT Act 2000 is India’s primary law governing cyber activities, digital transactions, and electronic governance. It provides a legal framework for cybersecurity, digital signatures, data protection, and penalties for cyber offenses. Aim of the act: Facilitate secure electronic communication and commerce. Ensure penalties for cybercrimes and protection of user data. Foster innovation and trust in the Indian IT and digital ecosystem. Key Features: Legal recognition of electronic records and digital signatures. Defines liabilities and protections for intermediaries. Empowers the Central Government and CERT-In for cybersecurity regulation. Amended in 2008 and 2015 to address evolving cyber challenges. Key Provisions in News: Section 69A of IT Act, 2000: Empowers the government to block public access to online information in interest of sovereignty, security, public order, or prevention of incitement. Requires written orders and procedural safeguards, upheld in the Shreya Singhal vs Union of India (2015) verdict. Section 79 of IT Act, 2000: Provides conditional immunity to intermediaries for third-party content. Under Section 79(3)(b), intermediaries must remove unlawful content when notified by the government or lose immunity. Does not authorize direct blocking orders; only notifies intermediaries of liability.
#### 2. Question
Consider the following statements regarding the IT Act, 2000:
• It provides legal recognition for electronic contracts and digital signatures.
• It grants absolute immunity to intermediaries for third-party content under all conditions.
• It empowers CERT-In to handle cybersecurity threats and incidents.
How many of the above statements is/are correct?
• (a) Only one
• (b) Only two
• (c) All three
Solution: b)
Statements 1 and 3 are correct.
• The IT Act, 2000 was instrumental in giving legal recognition to digital documents, electronic contracts, and digital signatures, thus enabling the growth of e-commerce and online governance.
• Statement 3 is also correct — the Act recognizes the Indian Computer Emergency Response Team (CERT-In) as the national agency for cybersecurity. It is empowered to monitor, prevent, and respond to cyber incidents and is also authorized to request logs and other technical data.
• Statement 2 is incorrect — Section 79 provides conditional immunity. Intermediaries must take down content when legally notified. Failure to do so removes this protection.
About Information Technology (IT) Act, 2000:
• What it is:
• The IT Act 2000 is India’s primary law governing cyber activities, digital transactions, and electronic governance. It provides a legal framework for cybersecurity, digital signatures, data protection, and penalties for cyber offenses.
• The IT Act 2000 is India’s primary law governing cyber activities, digital transactions, and electronic governance.
• It provides a legal framework for cybersecurity, digital signatures, data protection, and penalties for cyber offenses.
• Aim of the act:
• Facilitate secure electronic communication and commerce. Ensure penalties for cybercrimes and protection of user data. Foster innovation and trust in the Indian IT and digital ecosystem.
• Facilitate secure electronic communication and commerce.
• Ensure penalties for cybercrimes and protection of user data.
• Foster innovation and trust in the Indian IT and digital ecosystem.
• Key Features:
• Legal recognition of electronic records and digital signatures. Defines liabilities and protections for intermediaries. Empowers the Central Government and CERT-In for cybersecurity regulation. Amended in 2008 and 2015 to address evolving cyber challenges.
• Legal recognition of electronic records and digital signatures.
• Defines liabilities and protections for intermediaries.
• Empowers the Central Government and CERT-In for cybersecurity regulation.
• Amended in 2008 and 2015 to address evolving cyber challenges.
• Key Provisions in News: Section 69A of IT Act, 2000:
• Section 69A of IT Act, 2000:
• Empowers the government to block public access to online information in interest of sovereignty, security, public order, or prevention of incitement. Requires written orders and procedural safeguards, upheld in the Shreya Singhal vs Union of India (2015) verdict.
• Empowers the government to block public access to online information in interest of sovereignty, security, public order, or prevention of incitement. Requires written orders and procedural safeguards, upheld in the Shreya Singhal vs Union of India (2015) verdict.
• Empowers the government to block public access to online information in interest of sovereignty, security, public order, or prevention of incitement.
• Requires written orders and procedural safeguards, upheld in the Shreya Singhal vs Union of India (2015) verdict.
• Section 79 of IT Act, 2000:
• Section 79 of IT Act, 2000:
• Provides conditional immunity to intermediaries for third-party content. Under Section 79(3)(b), intermediaries must remove unlawful content when notified by the government or lose immunity. Does not authorize direct blocking orders; only notifies intermediaries of liability.
• Provides conditional immunity to intermediaries for third-party content. Under Section 79(3)(b), intermediaries must remove unlawful content when notified by the government or lose immunity. Does not authorize direct blocking orders; only notifies intermediaries of liability.
• Provides conditional immunity to intermediaries for third-party content.
• Under Section 79(3)(b), intermediaries must remove unlawful content when notified by the government or lose immunity.
• Does not authorize direct blocking orders; only notifies intermediaries of liability.
Solution: b)
Statements 1 and 3 are correct.
• The IT Act, 2000 was instrumental in giving legal recognition to digital documents, electronic contracts, and digital signatures, thus enabling the growth of e-commerce and online governance.
• Statement 3 is also correct — the Act recognizes the Indian Computer Emergency Response Team (CERT-In) as the national agency for cybersecurity. It is empowered to monitor, prevent, and respond to cyber incidents and is also authorized to request logs and other technical data.
• Statement 2 is incorrect — Section 79 provides conditional immunity. Intermediaries must take down content when legally notified. Failure to do so removes this protection.
About Information Technology (IT) Act, 2000:
• What it is:
• The IT Act 2000 is India’s primary law governing cyber activities, digital transactions, and electronic governance. It provides a legal framework for cybersecurity, digital signatures, data protection, and penalties for cyber offenses.
• The IT Act 2000 is India’s primary law governing cyber activities, digital transactions, and electronic governance.
• It provides a legal framework for cybersecurity, digital signatures, data protection, and penalties for cyber offenses.
• Aim of the act:
• Facilitate secure electronic communication and commerce. Ensure penalties for cybercrimes and protection of user data. Foster innovation and trust in the Indian IT and digital ecosystem.
• Facilitate secure electronic communication and commerce.
• Ensure penalties for cybercrimes and protection of user data.
• Foster innovation and trust in the Indian IT and digital ecosystem.
• Key Features:
• Legal recognition of electronic records and digital signatures. Defines liabilities and protections for intermediaries. Empowers the Central Government and CERT-In for cybersecurity regulation. Amended in 2008 and 2015 to address evolving cyber challenges.
• Legal recognition of electronic records and digital signatures.
• Defines liabilities and protections for intermediaries.
• Empowers the Central Government and CERT-In for cybersecurity regulation.
• Amended in 2008 and 2015 to address evolving cyber challenges.
• Key Provisions in News: Section 69A of IT Act, 2000:
• Section 69A of IT Act, 2000:
• Empowers the government to block public access to online information in interest of sovereignty, security, public order, or prevention of incitement. Requires written orders and procedural safeguards, upheld in the Shreya Singhal vs Union of India (2015) verdict.
• Empowers the government to block public access to online information in interest of sovereignty, security, public order, or prevention of incitement. Requires written orders and procedural safeguards, upheld in the Shreya Singhal vs Union of India (2015) verdict.
• Empowers the government to block public access to online information in interest of sovereignty, security, public order, or prevention of incitement.
• Requires written orders and procedural safeguards, upheld in the Shreya Singhal vs Union of India (2015) verdict.
• Section 79 of IT Act, 2000:
• Section 79 of IT Act, 2000:
• Provides conditional immunity to intermediaries for third-party content. Under Section 79(3)(b), intermediaries must remove unlawful content when notified by the government or lose immunity. Does not authorize direct blocking orders; only notifies intermediaries of liability.
• Provides conditional immunity to intermediaries for third-party content. Under Section 79(3)(b), intermediaries must remove unlawful content when notified by the government or lose immunity. Does not authorize direct blocking orders; only notifies intermediaries of liability.
• Provides conditional immunity to intermediaries for third-party content.
• Under Section 79(3)(b), intermediaries must remove unlawful content when notified by the government or lose immunity.
• Does not authorize direct blocking orders; only notifies intermediaries of liability.
• Question 3 of 5 3. Question Consider the following statements regarding carbon removal and offset methods: Direct Air Capture (DAC) uses biological processes to remove CO₂ from the atmosphere. Reforestation is considered a form of negative emissions technology. Which of the above statements is/are correct? (a) 1 only (b) 2 only (c) Both 1 and 2 (d) Neither 1 nor 2 Correct Solution: b) Statement 1 is incorrect. Direct Air Capture (DAC) refers to engineered systems that extract CO₂ directly from ambient air using chemical sorbents, such as solid filters or liquid solvents. These systems are distinctly technological and not biological. DAC is an artificial carbon dioxide removal method, unlike biological approaches such as afforestation, soil carbon sequestration, or ocean fertilization. Statement 2 is correct. Reforestation involves planting trees in deforested or degraded areas, and these trees absorb atmospheric CO₂ through photosynthesis, making it a natural and cost-effective negative emissions technology (NET). It is recognized in climate mitigation strategies globally, especially under frameworks like the IPCC and the Paris Agreement, as a crucial tool for achieving net-zero emissions. Incorrect Solution: b) Statement 1 is incorrect. Direct Air Capture (DAC) refers to engineered systems that extract CO₂ directly from ambient air using chemical sorbents, such as solid filters or liquid solvents. These systems are distinctly technological and not biological. DAC is an artificial carbon dioxide removal method, unlike biological approaches such as afforestation, soil carbon sequestration, or ocean fertilization. Statement 2 is correct. Reforestation involves planting trees in deforested or degraded areas, and these trees absorb atmospheric CO₂ through photosynthesis, making it a natural and cost-effective negative emissions technology (NET). It is recognized in climate mitigation strategies globally, especially under frameworks like the IPCC and the Paris Agreement, as a crucial tool for achieving net-zero emissions.
#### 3. Question
Consider the following statements regarding carbon removal and offset methods:
• Direct Air Capture (DAC) uses biological processes to remove CO₂ from the atmosphere.
• Reforestation is considered a form of negative emissions technology.
Which of the above statements is/are correct?
• (a) 1 only
• (b) 2 only
• (c) Both 1 and 2
• (d) Neither 1 nor 2
Solution: b)
• Statement 1 is incorrect. Direct Air Capture (DAC) refers to engineered systems that extract CO₂ directly from ambient air using chemical sorbents, such as solid filters or liquid solvents. These systems are distinctly technological and not biological. DAC is an artificial carbon dioxide removal method, unlike biological approaches such as afforestation, soil carbon sequestration, or ocean fertilization.
• Statement 2 is correct. Reforestation involves planting trees in deforested or degraded areas, and these trees absorb atmospheric CO₂ through photosynthesis, making it a natural and cost-effective negative emissions technology (NET). It is recognized in climate mitigation strategies globally, especially under frameworks like the IPCC and the Paris Agreement, as a crucial tool for achieving net-zero emissions.
Solution: b)
• Statement 1 is incorrect. Direct Air Capture (DAC) refers to engineered systems that extract CO₂ directly from ambient air using chemical sorbents, such as solid filters or liquid solvents. These systems are distinctly technological and not biological. DAC is an artificial carbon dioxide removal method, unlike biological approaches such as afforestation, soil carbon sequestration, or ocean fertilization.
• Statement 2 is correct. Reforestation involves planting trees in deforested or degraded areas, and these trees absorb atmospheric CO₂ through photosynthesis, making it a natural and cost-effective negative emissions technology (NET). It is recognized in climate mitigation strategies globally, especially under frameworks like the IPCC and the Paris Agreement, as a crucial tool for achieving net-zero emissions.
• Question 4 of 5 4. Question Consider the following statements regarding Heatwaves. Statement-I: Heatwaves have a disproportionately higher impact on women and elderly populations. Statement-II: Women and elderly are biologically more resilient to temperature fluctuations. Which one of the following is correct in respect of the above statements? a) Both Statement-I and Statement-II are correct and Statement-II is the correct explanation for Statement-I b) Both Statement-I and Statement-II are correct and Statement-II is not the correct explanation for Statement-I c) Statement-I is correct but Statement-II is incorrect d) Statement-I is incorrect but Statement-II is correct Correct Solution: c) Statement-I is correct. Heatwaves disproportionately impact women and the elderly due to a combination of biological vulnerabilities and socio-economic disadvantages. Elderly individuals often have diminished thermoregulation, chronic health conditions, and limited mobility, which increases their risk of heat-related illnesses such as heatstroke or cardiovascular events. Women, especially pregnant or lactating, face higher physiological strain during extreme heat. Additionally, gender-based disparities in access to resources such as air conditioning, healthcare, or safe housing further elevate risk. Statement-II is incorrect. Contrary to the claim, women and elderly populations are not biologically more resilient. In fact, both groups exhibit reduced physiological capacity to cope with thermal stress. The elderly may not sense heat effectively or adapt behaviours quickly, while women—particularly in marginalized settings—may be more exposed due to caregiving roles or work in unregulated environments. Incorrect Solution: c) Statement-I is correct. Heatwaves disproportionately impact women and the elderly due to a combination of biological vulnerabilities and socio-economic disadvantages. Elderly individuals often have diminished thermoregulation, chronic health conditions, and limited mobility, which increases their risk of heat-related illnesses such as heatstroke or cardiovascular events. Women, especially pregnant or lactating, face higher physiological strain during extreme heat. Additionally, gender-based disparities in access to resources such as air conditioning, healthcare, or safe housing further elevate risk. Statement-II is incorrect. Contrary to the claim, women and elderly populations are not biologically more resilient. In fact, both groups exhibit reduced physiological capacity to cope with thermal stress. The elderly may not sense heat effectively or adapt behaviours quickly, while women—particularly in marginalized settings—may be more exposed due to caregiving roles or work in unregulated environments.
#### 4. Question
Consider the following statements regarding Heatwaves.
Statement-I: Heatwaves have a disproportionately higher impact on women and elderly populations. Statement-II: Women and elderly are biologically more resilient to temperature fluctuations.
Which one of the following is correct in respect of the above statements?
• a) Both Statement-I and Statement-II are correct and Statement-II is the correct explanation for Statement-I
• b) Both Statement-I and Statement-II are correct and Statement-II is not the correct explanation for Statement-I
• c) Statement-I is correct but Statement-II is incorrect
• d) Statement-I is incorrect but Statement-II is correct
Solution: c)
• Statement-I is correct. Heatwaves disproportionately impact women and the elderly due to a combination of biological vulnerabilities and socio-economic disadvantages.
• Elderly individuals often have diminished thermoregulation, chronic health conditions, and limited mobility, which increases their risk of heat-related illnesses such as heatstroke or cardiovascular events.
• Women, especially pregnant or lactating, face higher physiological strain during extreme heat. Additionally, gender-based disparities in access to resources such as air conditioning, healthcare, or safe housing further elevate risk.
• Statement-II is incorrect. Contrary to the claim, women and elderly populations are not biologically more resilient. In fact, both groups exhibit reduced physiological capacity to cope with thermal stress. The elderly may not sense heat effectively or adapt behaviours quickly, while women—particularly in marginalized settings—may be more exposed due to caregiving roles or work in unregulated environments.
Solution: c)
• Statement-I is correct. Heatwaves disproportionately impact women and the elderly due to a combination of biological vulnerabilities and socio-economic disadvantages.
• Elderly individuals often have diminished thermoregulation, chronic health conditions, and limited mobility, which increases their risk of heat-related illnesses such as heatstroke or cardiovascular events.
• Women, especially pregnant or lactating, face higher physiological strain during extreme heat. Additionally, gender-based disparities in access to resources such as air conditioning, healthcare, or safe housing further elevate risk.
• Statement-II is incorrect. Contrary to the claim, women and elderly populations are not biologically more resilient. In fact, both groups exhibit reduced physiological capacity to cope with thermal stress. The elderly may not sense heat effectively or adapt behaviours quickly, while women—particularly in marginalized settings—may be more exposed due to caregiving roles or work in unregulated environments.
• Question 5 of 5 5. Question Match the following maternal health schemes with their key features: Scheme Feature A. Pradhan Mantri Surakshit Matritva Abhiyan (PMSMA) 1. Free delivery, C-sections, and transport for pregnant women B. Janani Shishu Suraksha Karyakram (JSSK) 2. Respectful and quality maternal & newborn care C. Surakshit Matritva Aashwasan (SUMAN) 3. Specialist antenatal care (ANC) on the 9th of each month x Which of the following pairs are correctly matched? a) A-1, B-3, C-2 b) A-1, B-2, C-3 c) A-2, B-3, C-1 d) A-3, B-1, C-2 Correct Solution: d) PMSMA – 3: The Pradhan Mantri Surakshit Matritva Abhiyan (PMSMA) provides assured, comprehensive, and quality antenatal care (ANC) to pregnant women on the 9th of every month by specialists such as gynaecologists and physicians. It targets early detection of high-risk pregnancies and timely referral. JSSK – 1: The Janani Shishu Suraksha Karyakram (JSSK) ensures free delivery services, including C-sections, medicines, diagnostics, blood transfusion, and transport for pregnant women and sick newborns up to 30 days post-birth, eliminating out-of-pocket expenses in public health facilities. SUMAN – 2: The Surakshit Matritva Aashwasan (SUMAN) initiative aims to provide dignified, respectful, and quality healthcare to all mothers and newborns, emphasizing zero tolerance for denial of services, clean environments, and grievance redressal mechanisms. Incorrect Solution: d) PMSMA – 3: The Pradhan Mantri Surakshit Matritva Abhiyan (PMSMA) provides assured, comprehensive, and quality antenatal care (ANC) to pregnant women on the 9th of every month by specialists such as gynaecologists and physicians. It targets early detection of high-risk pregnancies and timely referral. JSSK – 1: The Janani Shishu Suraksha Karyakram (JSSK) ensures free delivery services, including C-sections, medicines, diagnostics, blood transfusion, and transport for pregnant women and sick newborns up to 30 days post-birth, eliminating out-of-pocket expenses in public health facilities. SUMAN – 2: The Surakshit Matritva Aashwasan (SUMAN) initiative aims to provide dignified, respectful, and quality healthcare to all mothers and newborns, emphasizing zero tolerance for denial of services, clean environments, and grievance redressal mechanisms.
#### 5. Question
Match the following maternal health schemes with their key features:
Scheme | Feature
A. Pradhan Mantri Surakshit Matritva Abhiyan (PMSMA) | 1. Free delivery, C-sections, and transport for pregnant women
B. Janani Shishu Suraksha Karyakram (JSSK) | 2. Respectful and quality maternal & newborn care
C. Surakshit Matritva Aashwasan (SUMAN) | 3. Specialist antenatal care (ANC) on the 9th of each month
Which of the following pairs are correctly matched?
• a) A-1, B-3, C-2
• b) A-1, B-2, C-3
• c) A-2, B-3, C-1
• d) A-3, B-1, C-2
Solution: d)
• PMSMA – 3: The Pradhan Mantri Surakshit Matritva Abhiyan (PMSMA) provides assured, comprehensive, and quality antenatal care (ANC) to pregnant women on the 9th of every month by specialists such as gynaecologists and physicians. It targets early detection of high-risk pregnancies and timely referral.
• JSSK – 1: The Janani Shishu Suraksha Karyakram (JSSK) ensures free delivery services, including C-sections, medicines, diagnostics, blood transfusion, and transport for pregnant women and sick newborns up to 30 days post-birth, eliminating out-of-pocket expenses in public health facilities.
• SUMAN – 2: The Surakshit Matritva Aashwasan (SUMAN) initiative aims to provide dignified, respectful, and quality healthcare to all mothers and newborns, emphasizing zero tolerance for denial of services, clean environments, and grievance redressal mechanisms.
Solution: d)
• PMSMA – 3: The Pradhan Mantri Surakshit Matritva Abhiyan (PMSMA) provides assured, comprehensive, and quality antenatal care (ANC) to pregnant women on the 9th of every month by specialists such as gynaecologists and physicians. It targets early detection of high-risk pregnancies and timely referral.
• JSSK – 1: The Janani Shishu Suraksha Karyakram (JSSK) ensures free delivery services, including C-sections, medicines, diagnostics, blood transfusion, and transport for pregnant women and sick newborns up to 30 days post-birth, eliminating out-of-pocket expenses in public health facilities.
• SUMAN – 2: The Surakshit Matritva Aashwasan (SUMAN) initiative aims to provide dignified, respectful, and quality healthcare to all mothers and newborns, emphasizing zero tolerance for denial of services, clean environments, and grievance redressal mechanisms.
Join our Official Telegram Channel HERE for Motivation and Fast Updates
Join our Twitter Channel HERE
Follow our Instagram Channel HERE