Start learning 50% faster. Sign in now
National Food Security Act The Act provides for food and nutritional security in the human life cycle approach, by ensuring access to an adequate quantity of quality food at affordable prices for people to live a life with dignity and for matters connected therewith or incidental thereto. Salient Features of the NFSA o Coverage: The state-wise coverage was determined by the NITI Aayog based on the 2011-12 Household Consumption Expenditure survey of NSSO. o The Act legally entitled up to 75% of the rural population and 50% of the urban population to receive subsidized foodgrains under the Targeted Public Distribution System (TPDS). o About two-thirds of the population, therefore, is covered under the Act to receive highly subsidized foodgrains. Entitlements: o The food grains would be provided at highly subsidized prices under the Public Distribution System. o The Act ensures nutritional support to women and children. Pregnant and lactating women would be entitled to nutritious meals, free of charge under the MDM and ICDS schemes. o Children in the age group of 6-14 years would also be entitled to free nutritious meals under the MDM and ICDS schemes. o Maternity benefit of not less than Rs.6000 is also provided to pregnant women and lactating mothers. o The Act also empowers women by identifying the eldest woman of the household as the head of the household to issue ration cards. There is a provision of a food security allowance to the beneficiaries in the event of non-supply of food grains. Transparency: Provisions have been made to disclose the records related to the PDS to ensure transparency.
Consider a B+-tree in which the maximum number of keys in a node is 5. What is the minimum number of keys in any non-root node?
A resistor has a resistance of 100 ohms and a current of 2 amperes passing through it. Calculate the voltage drop across the resistor.
Which layer of the OSI model is responsible for addressing and routing data across multiple networks?
Which of the following is a common programming technique to prevent SQL injection attacks?
Which of the following is a base case in recursive functions?
Why probe packets are transmitted in the network
Which command is used to display the contents of a file in a Unix/Linux system?
In a voltage divider circuit, if the resistors are of equal value, what is the output voltage?
What is the primary responsibility of the "Controller" in the MVC architecture?
Which one of the following is used for artificial intelligence?