Central Government has power to remove any difficulty arising in giving effect to the provisions of SEBI Act. What is the maximum period up to which such order can be passed?
Section 34 of SEBI Act - Power to remove difficulties —(1) If any difficulty arises in giving effect to the provisions of this Act, the Central Government may, by order, published in the Official Gazette, make such provisions not inconsistent with the provisions of this Act as may appear to be necessary for removing the difficulty: Provided that no order shall be made under this section after the expiry of five years from the commencement of this Act. (2) Every order made under this section shall be laid, as soon as may be after it is made, before each House of Parliament. Similar section is present in Depository Act. In case of Depository Act, Section 29 deals with this provision and maximum period is two years. Removal of difficulties — (1) If any difficulty arises in giving effect to the provisions of this Act, the Central Government may, by order published in the Official Gazette, make such provisions not inconsistent with the provisions of this Act as appear to it to be necessary or expedient for removing the difficulty: Provided that no order shall be made under this section after the expiry of a period of two years from the commencement of this Act. (2) Every order made under this section shall be laid, as soon as may be after it is made, before each House of Parliament.
Who among the following is known as father of Internet?
Internet banking is an example of
What do you need to put your web pages on the www ?
The unit of communication at the data link layer is a .......................,,,,,,,,,,,,,
Select the option that includes file formats suitable for distributing sound files across the internet.
Who invented the World Wide Web?
How to verify that while sending confidential information over the Internet such as usernames, passwords, or credit card numbers, sent data is encrypted
The “home page” of a web site is _________.
What is the purpose of a Honeypot in network security?
Transfer of data from one application to another line is known as :