Question
As far as the Stand Up India Scheme is concerned, In
case of non-individual enterprises, __________ of the shareholding and controlling stake should be held by either SC/ST and/or Women Entrepreneur.Solution
Stand Up India: Launched in 2016 for facilitating credit to SC/ST and Women entrepreneurs The scheme covers all branches of Scheduled Commercial Banks. Bank loans between Rs.10 lakh and Rs. 1 crore to SC/ ST borrower and woman borrower for setting up a greenfield enterprise. The scheme provides financial assistance (funded /non-funded) for working capital, acquisition of fixed assets in manufacturing, services or retail sector. Loan may be secure by collateral security or at the guarantee of Credit Guarantee Fund for Stand-Up India Loans (BGFSIL) as decided by the banks. The scheme, which covers all branches of Scheduled Commercial Banks, can be accessed in three potential ways: •          Directly at the branch •          Through Stand-Up India Portal (www.standupmitra.in) •          Through the Lead District Manager (LDM) Eligibility •          SC/ST and/or woman entrepreneurs, above 18 years of age •          In case of non-individual enterprises, 51% of the shareholding and controlling stake should be held by either SC/ST and/or Women Entrepreneur •          Borrower should not be in default to any bank/financial institution •          Minimum 10% of the project cost to be borne by the borrower
Which I/O scheduling algorithm prevents starvation of requests?
Which module in Python supports regular expressions?
Which of the following code snippets correctly implements a singly linked list in Java, including the ability to insert a new node at the beginning?
Which of the following is a characteristic feature of a Relational Database Management System (RDBMS)?
Which type of software is designed to help users perform specific tasks, such as creating documents, spreadsheets, or presentations?
Which method is used to compute the inverse of a matrix in numerical computing efficiently?
The primary role of an operating system (OS) is to:
Which of the following best describes the main advantage of a Management Information System (MIS)?
In the context of Cross-Site Scripting (XSS), what is the primary reason why stored XSS is considered more dangerous than reflected XSS?
Which search strategy guarantees the optimal solution?