App Logo

No.1 PSC Learning App

1M+ Downloads
Under which plan was the State Data Centre (SDC) initiative formed?

ANational Health Mission (NHM)

BNational e-Governance Plan (NeGP)

CNational Rural Employment Guarantee Act (NREGA)

DNational Digital Literacy Mission (NDLM)

Answer:

B. National e-Governance Plan (NeGP)

Read Explanation:

SDCs serve as the backbone infrastructure for delivering e-Governance services in India. They were formed under the National e-Governance Plan (NeGP), which was launched in 2006 by the Department of Electronics and Information Technology (DeitY), Government of India.

The primary objective of the SDC initiative was to provide a secure and centralized facility for states to host their various applications and data, ensuring efficient electronic delivery of government services to citizens (G2C), businesses (G2B), and government agencies (G2G).


Related Questions:

Which of the following are key components showcased by the India Stack Global initiative?

  1. Aadhaar and UPI
  2. API Setu and DigiLocker
  3. e-Governance Services like eOffice and UMANG
  4. Traditional paper-based record keeping systems
    The use of the internet and smartphones in E-governance facilitates the immediate transmission of what?

    Which of the following are considered key shared infrastructure components supporting the NeGP?

    1. State Data Centres (SDCs)
    2. National Information Centres (NICs)
    3. State Wide Area Networks (SWANs)
    4. Common Services Centres (CSCs)

      What will Phase II of the SATHI portal development entail?

      1. Phase II will cover the seed supply chain and inventory management.
      2. Phase II will utilize QR-coded seed bags to track the real-time movement of seeds.
      3. Phase II is focused on the initial production stages of seeds.
      4. Phase II involves manual data entry for all seed transactions.

        What role do digital signatures play in e-governance authentication?

        1. They are the primary method for verifying a user's identity online.
        2. They require minimal infrastructure and no updates.
        3. They are a cost-effective solution for authentication.
        4. They help in providing security by confirming a user's identity.