SSC CGL Exam  >  SSC CGL Questions  >  Direction: Read the following passage careful... Start Learning for Free
Direction: Read the following passage carefully and answer the questions that follow.
However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.” 
Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.
  • a)
    1-3 and 2-4
  • b)
    1-2 and 3-4
  • c)
    Only 1-4
  • d)
    Only 2-4
Correct answer is option 'C'. Can you explain this answer?
Most Upvoted Answer
Direction: Read the following passage carefully and answer the questio...
As per the given context of the passage the counter-espionage law which will come into effect on the proposed date will make necessary additions in the provisions by including all texts and documents under the ambit of national security interests. Thereby, just replacing (1) with (4) yields a meaningful and grammatically correct statement. No other replacements are required.
Therefore, option C is the correct answer.
Explore Courses for SSC CGL exam

Top Courses for SSC CGL

Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer?
Question Description
Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? for SSC CGL 2024 is part of SSC CGL preparation. The Question and answers have been prepared according to the SSC CGL exam syllabus. Information about Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? covers all topics & solutions for SSC CGL 2024 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer?.
Solutions for Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? in English & in Hindi are available as part of our courses for SSC CGL. Download more important topics, notes, lectures and mock test series for SSC CGL Exam by signing up for free.
Here you can find the meaning of Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer?, a detailed solution for Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? has been provided alongside types of Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? tests, examples and also practice SSC CGL tests.
Explore Courses for SSC CGL exam

Top Courses for SSC CGL

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev