SSC CGL Exam  >  SSC CGL Questions  >  Direction: Read the following passage careful... Start Learning for Free
Direction: Read the following passage carefully and answer the questions that follow.
However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.” 
Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?
I. despite
II. that
III. because
  • a)
    Only III
  • b)
    Both I and III
  • c)
    Only I
  • d)
    Only II
Correct answer is option 'D'. Can you explain this answer?
Most Upvoted Answer
Direction: Read the following passage carefully and answer the questio...
By using "that" as a subordinating conjunction, the sentence structure remains grammatically correct, and the meaning is preserved. The subordinate clause introduced by "that" (nontraditional security issues have acquired greater significance in its developmental narrative) adds more information to support the statement in the main clause (China's attempt to securitize its development).
I. Despite: The word "despite" indicates a contrast or opposition between two ideas. However, in this case, the two sentences do not present opposing ideas or contrasting information. Therefore, "despite" would not be appropriate to join these sentences.
III. Because: The word "because" indicates a cause-and-effect relationship, where one statement provides the reason or explanation for the other. While the second sentence provides information that supports the first sentence, it does not directly explain or provide a reason for it. Thus, "because" would not be the suitable connector to join these sentences.
Therefore, the correct answer is option D.
Explore Courses for SSC CGL exam

Top Courses for SSC CGL

Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?I. despiteII. thatIII. becausea)Only IIIb)Both I and IIIc)Only Id)Only IICorrect answer is option 'D'. Can you explain this answer?
Question Description
Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?I. despiteII. thatIII. becausea)Only IIIb)Both I and IIIc)Only Id)Only IICorrect answer is option 'D'. Can you explain this answer? for SSC CGL 2024 is part of SSC CGL preparation. The Question and answers have been prepared according to the SSC CGL exam syllabus. Information about Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?I. despiteII. thatIII. becausea)Only IIIb)Both I and IIIc)Only Id)Only IICorrect answer is option 'D'. Can you explain this answer? covers all topics & solutions for SSC CGL 2024 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?I. despiteII. thatIII. becausea)Only IIIb)Both I and IIIc)Only Id)Only IICorrect answer is option 'D'. Can you explain this answer?.
Solutions for Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?I. despiteII. thatIII. becausea)Only IIIb)Both I and IIIc)Only Id)Only IICorrect answer is option 'D'. Can you explain this answer? in English & in Hindi are available as part of our courses for SSC CGL. Download more important topics, notes, lectures and mock test series for SSC CGL Exam by signing up for free.
Here you can find the meaning of Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?I. despiteII. thatIII. becausea)Only IIIb)Both I and IIIc)Only Id)Only IICorrect answer is option 'D'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?I. despiteII. thatIII. becausea)Only IIIb)Both I and IIIc)Only Id)Only IICorrect answer is option 'D'. Can you explain this answer?, a detailed solution for Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?I. despiteII. thatIII. becausea)Only IIIb)Both I and IIIc)Only Id)Only IICorrect answer is option 'D'. Can you explain this answer? has been provided alongside types of Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?I. despiteII. thatIII. becausea)Only IIIb)Both I and IIIc)Only Id)Only IICorrect answer is option 'D'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice Direction: Read the following passage carefully and answer the questions that follow.However rhetorical as it may sound, the reality is that threat to security has become a ubiquitous concern in all aspects of governance in China. Under President Xi Jinping, Chinese ____(A)____on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’. On numerous occasions, including at the 20th Party Congress last year and the Two Sessions (the annual plenary sessions of the National People’s Congress and of the Chinese People’s Political Consultative Conference) this year, Mr. Xi ___(B)__the need to balance development with security. (C) China’s incessant attempt to securitise its development has meant (D) nontraditional security issues have acquired greater significance in its developmental narrative. And among all the nontraditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most. This is apparent in their recent attempts to strengthen cybersecurity and counter-espionage laws. (E) The recently amended Counter-espionage Law (1) broadening the scope of espionage, (2) aims to treat all “documents, data, materials, and items relating to national security and interests,” (3) at par with state secrets, thus, (4) that will come into effect from July 1, 2023. It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure. (F) The revised law also empowers authorities to seize data, electronic equipment, and information on personal property, and even ban border crossing. Following up on the above amendments, China also unveiled in late May its position paper on Global Digital Governance that calls upon States to “respect the sovereignty, jurisdiction and governance of data of other States,” and to “not obtain data located in other States through companies or individuals without other States’ permission.”Q. Which among the following connector(s) would join the sentences C and D keeping them grammatically and contextually correct and the meaning intact?I. despiteII. thatIII. becausea)Only IIIb)Both I and IIIc)Only Id)Only IICorrect answer is option 'D'. Can you explain this answer? tests, examples and also practice SSC CGL tests.
Explore Courses for SSC CGL exam

Top Courses for SSC CGL

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev