SSC CGL Exam  >  SSC CGL Questions  >  Direction: Read the following passage careful... Start Learning for Free
Direction: Read the following passage carefully and answer the questions that follow.
However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.” 
Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.
  • a)
    1-3 and 2-4
  • b)
    1-2 and 3-4
  • c)
    Only 1-4
  • d)
    Only 2-4
Correct answer is option 'C'. Can you explain this answer?
Most Upvoted Answer
Direction: Read the following passage carefully and answer the questio...
As per the given context of the passage the counter-espionage law which will come into effect on the proposed date will make necessary additions in the provisions by including all texts and documents under the ambit of national security interests. Thereby, just replacing (1) with (4) yields a meaningful and grammatically correct statement. No other replacements are required.
Therefore, option C is the correct answer.
Explore Courses for SSC CGL exam

Similar SSC CGL Doubts

Directions: ​Read the following passage and answer the questions given below. Some words may be underline read carefully.The devastating monsoon floods in the region have raised concerns on the political decisions related to the environment. AK Roy, who chaired the Environment Committee discussion, said the recent disaster in the region was a direct result of selfish policymaking. The regional authorities responsible for the disaster-prone area must go back to the drawing table with the reports of the Committee. The task before them should be to correct the environmental policy decisions. This is going to be difficult because they need to balance human development pressures with stronger protection of the ecology of the disaster-prone area. The issue of allowing quarrying and mining in the region are arguably the most contentious. A way out could be to create the regulatory framework that was proposed by the Roy panel, in the form of an apex Ecology Authority and the regional level units, under the Environment (Protection) Act, and to adopt the zoning system that is proposed. This can keep harmful activities out of the vulnerable regions. The goal has to be sustainable development for the disaster-prone region as a whole. The role of big hydroelectric dams, built during an era of rising power demand, must now be reconsidered and proposals for building new dams should be done away with. Different forms of green energy led by solar power are available. A moratorium on quarrying and mining in the identified vulnerable regions is necessary to assess their environmental impact. The regional authority has acknowledged the need to review decisions affecting the environment. Public consultation on the expert reports that includes people’s representatives will find greater resonance now and help chart a sustainable path ahead.Q. Which among the following is the view of the regional authority regarding the efforts towards development of the disaster prone region?

Top Courses for SSC CGL

Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer?
Question Description
Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? for SSC CGL 2024 is part of SSC CGL preparation. The Question and answers have been prepared according to the SSC CGL exam syllabus. Information about Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? covers all topics & solutions for SSC CGL 2024 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer?.
Solutions for Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? in English & in Hindi are available as part of our courses for SSC CGL. Download more important topics, notes, lectures and mock test series for SSC CGL Exam by signing up for free.
Here you can find the meaning of Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer?, a detailed solution for Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? has been provided alongside types of Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. The sentence given in (E) has four phrases given in bold. Amongst the given bold phrases which of the following must replace each other to make the sentence contextually correct and meaningful.a)1-3 and 2-4b)1-2 and 3-4c)Only 1-4d)Only 2-4Correct answer is option 'C'. Can you explain this answer? tests, examples and also practice SSC CGL tests.
Explore Courses for SSC CGL exam

Top Courses for SSC CGL

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev