Preview

Defence System

Satisfactory Essays
Open Document
Open Document
16134 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Defence System
-------------------------------------------------
Indian Armed Forces
From Wikipedia, the free encyclopedia Indian Armed Forces
'भारतीयसशस्त्रसेनाएं' | Emblem of India Indian Army Indian Navy Indian Air Force Indian Coast Guard
Strategic Nuclear Command
Integrated Space Cell | Leadership | Commander-in-Chief | President PratibhaPatil | Ministry of Defence | A. K. Antony | Chairman of the Chiefs of Staff Committee | Admiral Nirmal Kumar Verma | Manpower | Military age | 18 years of age[1] | Conscription | None | Available for military service | 319,129,420 males, age 16–49 (2010 est.),
296,071,637 females, age 16–49 (2010 est.) | Fit for military service | 249,531,562 males, age 16–49 (2010 est.),
240,039,958 females, age 16–49 (2010 est.) | Reaching military age annually | 12,151,065 males (2010 est.),
10,745,891 females (2010 est.) | Active personnel | 1,325,000 (ranked 3rd) | Reserve personnel | 1,155,000 | Expenditures | Budget | US$ 46.8 billion (FY12)[2](ranked 8th) | Percent of GDP | 2.5% (2012 est.) | Industry | Domestic suppliers | Heavy Vehicles Factory
Bharat Electronics Limited
Gun Carriage Factory Jabalpur
Hindustan Aeronautics Limited
Ishapore Rifle Factory
Ordnance Factories Board
Tata Motors
Heavy Alloy Penetrator Project
Mazagon Dock Limited
Cochin Shipyard
Bharat Dynamics
Bajaj Auto - Joint Venture - Rolta India Ltd
Mahindra & Mahindra
Ashok Leyland
Shaktiman truck
Maruti Suzuki | Foreign suppliers | Russia[3] Israel[3] France[3] | Annual imports | Russia | Annual exports | Nepal, Bhutan, Sri Lanka, Mauritius, Myanmar, Ecuador, Maldives | Related articles | History | Military history of India
British Indian Army
Indian National Army | Ranks | Air Force
Army
Navy |
The Indian Armed Forces are the military forces of theRepublic of India. They consist of the Army, Navy, Air Force and Indian Coast Guard, supported by Paramilitary forces (Assam Rifles and

You May Also Find These Documents Helpful

  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Physical Security

    • 848 Words
    • 4 Pages

    The Bloom Design Group is a company that offers interior design services to businesses and individuals throughout the world. Bloom has a corporate office in New York and a second office in Los Angeles. The company’s Web site features a virtual decorating tool, which offers clients the chance to play with different color and design schemes. This tool allows their clients to get an idea of what a design project would look like once it is completed, before actually making color and design decisions. The Web site also gives interior designers access to their client files and company style guides, as well as the ability to electronically process orders for design materials and furniture. The designers use a secure login and a password to gain access to the Web site and its features. The company 's workforce spends all its time working remotely and accessing the corporate network using a secure VPN.…

    • 848 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Without the defense acquisition system, the U.S. military would not enjoy the substantial capability that it has in the form of major systems, information technology, and medical system needed to meet the demand of modern conflicts, rapidly evolving operational environment and to perform support services at home or abroad. Although the military is acquiring systems with game changing capability, the acquisition process is failing to deliver full value to the Warfighter and to American taxpayers. Therefore, the defense acquisition system could benefit from improvement in several areas including better management of the acquisition system; improving the requirements process; developing and incentivizing the highest quality acquisition workforce;…

    • 613 Words
    • 3 Pages
    Good Essays
  • Good Essays

    safeguarding

    • 947 Words
    • 4 Pages

    Practitioners always plan what they’re going to do in order to meet childrens needs, to think about how they are going to achieve the particular task, how it’s going to benefit the child, what they are going to learn from it, is it appropriate and what will it’s short term and long term outcomes be. “Planning starts with observing children in order to understand and consider their current interests, development and learning. Contains table, which shows how the principles of Early Years Foundation Stage (EYFS) support pupils' development and learning” (http://nationalstrategies.standards.dcsf.gov.uk/node/84344). For practitioners to meet care and learning needs of children they often observe children in different experiences to see what their initial reaction would be this helps them to have a clearer view what the interests and likes of the child(ren) may be also what they may not enjoy and possibly won’t benefit from if this was set as a particular activity for them. As part of the EYFS there is a planning cycle that practitioners may follow in order to help plan out their observation.…

    • 947 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    A ____ is a shared electrical or optical channel that connects two or more devices.…

    • 584 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    An army (from Latin arma "arms, weapons" via Old French armée, "armed" (feminine)), is a fighting force that fights primarily on land. In the broadest sense, it is the land-based military branch, service branch or armed service of a nation or state. It may also include other branches of the military such as the air force via means of aviation corps. Within a national military force, the word army may also mean a field army. They differ from army reserves who are activated only during such times as war or natural disasters.…

    • 2432 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INNOVATION, T. G. (2011, August 17). Innovation Germany. Retrieved October 9, 2014, from German Innovation: http://www.germaninnovation.org/shared/content/documents/17_Issue_Ennovation_Germany-August_2011.pdf…

    • 6720 Words
    • 30 Pages
    Powerful Essays
  • Good Essays

    Fire Protection Systems

    • 635 Words
    • 3 Pages

    There are several types of fire extinguishing systems. They are wet, dry, chemical and gaseous types of systems that can be implemented. The type of fire and the circumstance that created it will dictate which methods are the best, safest and most efficient ways to extinguish a fire. Examples would be kitchen fires, grease fires in particular are difficult to extinguish with water and sometimes counterproductive to extinguishing the fire. Wet chemical systems are most commonly used to extinguish kitchen fires. Dry chemical fires extinguish flammable combustible fires. They both use gas to expel the agent. Wet chemical extinguishing protects appliances and is used in commercial kitchens. Fires involving cooking fats and oils (classified as class K (US) or F (Australia/Europe/Asia)) burn hotter than flammable liquids, rendering a standard class B extinguisher ineffective. Flammable liquids have flashpoints under 100 degrees Fahrenheit. Cooking oil is a combustible liquid since it has a flashpoint over 100 degrees. Such fires should be extinguished with a wet chemical extinguisher. Extinguishers of this type are designed to extinguish cooking fats and oils through saponification. The extinguishing agent rapidly converts the burning substance to a non-combustible soap. This process is endothermic, meaning it absorbs thermal energy from its surroundings, decreasing the temperature and eliminating the fire. This process is known as Saponification. Saponifiable substances are those that can be converted into soap. (http://en.wikipedia.org/wiki/Saponification, January 5, 2011)…

    • 635 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Border countries: Argentina 1,224 km, Bolivia 3,400 km, Colombia 1,643km, French Guiana 673 km, Guyana 1,119 km, Paraguay 1,290 km, Peru1,560 km, Suriname 597 km, Uruguay 985 km, Venezuela 2,200 km…

    • 2255 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Assignment On Safeguarding

    • 2018 Words
    • 9 Pages

    Safeguarding children is high priority within professional practices to ensure that all children are supported and have the right to reach full potential (Lindon, 2008). In order to show and understand how safeguarding is applied, a residential setting providing specialist care for children with autistic spectrum disorder (ASD) will be considered. The current legislation including Helping Children Achieve More will be explained to show how the multidisciplinary team around the child maintain standards and meet Ofsted requirements (Grigg, 2010). Other policy’s that are put in place by the specialist provider will also be considered to better understand how staff implement procedures and how best practice is carried out. The effectiveness…

    • 2018 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Airport Security Systems

    • 598 Words
    • 3 Pages

    Security is the degree of protection against danger, damage, loss, and crime ( TSA.gov 2012). The system that I will be discussing in my paper is the Airport Security system. This system has become very important to the airline industry because it ensures customer safety. Without the creation of TSA and the integration of information technology to monitor airports more efficiently we may have had several other attempts of terror attacks. September 11, 2001 was a very tragic day for the United States of America. On this day 19 terrorists boarded 4 passenger jets with the intent to hijack the planes and to crash 2 of them into the twin towers 1, into the Pentagon and one into the United States Capitol building but this plane never made it to its destination. Because air travel is apart of our daily lives a system had to be put into place to ensure the safety of flyers. To ensure that level of safety was met the TSA (Transportation Security Administration) was created. With the creation of TSA came the need to quickly establish Security checkpoints in all airports for baggage and for people to be scanned in a time manor so they could still make their flights.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Adversary System

    • 545 Words
    • 3 Pages

    * Reliant on the presentation of oral evidence that can be cross examined and tested for truth in the court by both parties…

    • 545 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 257 Words
    • 2 Pages

    Defining National Security VS Personal Privacy is a matter of looking at the basic nature of each. From research collected there is a consensus that we need balance. Too much of one hurts the other and vise versa. There are a couple of articles that range from Civil Liberties to the birth of public right to know that support the overall claim. Talks about the effects of censorship in different situations like war and peace will help prove that a balance needs to be forged. The problem here isn’t the definition of personal vs national security, but the survival of each in light of each other. There is history in our nation that explains why impinging on privacy may not be in the best interest of national security or of an individual. Also we will look at when it is appropriate for national security to impinge on personal privacy. You can’t have both without upsetting the balance of all. The claim is that too much national security will limit or demolish personal privacy. Also the same for too much personal privacy or liberty will limit or demolish security. So the question would be “does less personal privacy increase National Security?” My thesis is that too much National Security can destroy a government from the inside out by invading privacy. Democracy can’t trample on freedoms given the people for fear that a democracy no longer exists. “As Lee Strickland (2005) indicates, that ‘Civil liberties are not an obstacle; they’re a vital part of our strength.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Following India's growing openness, the arrival of new and existing models, easy availability of finance at relatively low rate of interest and price discounts offered by the dealers and manufacturers all have stirred the demand for vehicles and a strong growth of the Indian automobile industry.…

    • 770 Words
    • 4 Pages
    Good Essays