Does the government believe everything people say?

1 Answer

Answer :

The government is made of people, so it depends on who is in office. Also, don’t believe everything you see in the movies. I pretty certain there’s more than one scientist who makes those types of claims; NOAA in the US has a lot people working there for example.

Related questions

Description : Which of the following emits dangerous radioactive wastes forcing the government to eliminate its use? (a) Nuclear energy (b) Water energy (c) Geothermal energy (d) Solar energy

Last Answer : (a) Nuclear energy

Description : Full form of NGO a) Non Government Organization b) Non Govern Organise c) Non Govern Organ d) Non Govern Orpat

Last Answer : a) Non Government Organization

Description : Which is the nodal agency at the Indian Union Government for coordinating disaster management activities for all natural hazards? a. Minister of Home affairs b. Ministry of social justice and Empowerment c. Ministry of Science and Technology d. Ministry of Environment and Forests

Last Answer : a. Minister of Home affairs

Description : Who shall be the first responders in disaster management situation? a. Central Government b. Community c. Local Government d. State Government

Last Answer : b. Community

Description : Which of the following agencies are the National Disaster Risk Reduction stakeholders? a. Central Government b. National Disaster Offices c. Private Sector d. All of the above

Last Answer : d. All of the above

Description : The role of which agency is important in disaster prevention. a. Media b. Police c. Government officials d. Public

Last Answer : a. Media

Description : Which one is a major environmental and safety hazard for the people in hilly areas in Tripura which can be considered as “cancer of hill slopes” a) Flood (b) Landslide (c) Earthquake (d) Desertification

Last Answer : (b) Landslide

Description : Which of the following group of people are more vulnerable in the event of a disaster (a) Men, boys, old people (b) Men, Women, boys (c) Women, children, Old people (d) None of these

Last Answer : (c) Women, children, Old people

Description : Flood risk refers to: a) The chance of a flood occurring b) The number of people and properties exposed to floodwaters if a flood occurs c) The vulnerability of people and properties that are exposed to floodwaters d) All of the above.

Last Answer : d) All of the above.

Description : 11-03-2012 marked one year sine an earthquake and tsunami killed thousands of people in? a. Japan b. South Korea c. North Korea d. Indonesia

Last Answer : a. Japan

Description : By what measures can we significantly reduce the impact of disasters on our people? a. Better planning b. Preparedness awareness c. Mitigation measures d. All the above

Last Answer : d. All the above

Description : The date when the super cyclone hit the Orissa coast which killed nearly 10,000 people and affected over 15 million people across 12 districts of Orissa is? a. 29.08.1999 b. 29.08.1997 c. 29.08.1998 d. 29.08.1996

Last Answer : a. 29.08.1999

Description : According to World Disasters Report of 2010, during 2000-09, 85% of affected people belonged to the? a. Asia Pacific Region b. African region c. Japan region d. Australian region

Last Answer : a. Asia Pacific Region

Description : When a powerful earthquake struck South Eastern Iran and caused enormous loss of life and property Killing 30,000 people? a. 26.12.2003 b. 26.11.2003 c. 26.10.2003 d. 26.10.2002

Last Answer : a. 26.12.2003

Description : National Disaster Management Division of the Govt. of India wherever necessary, sends to disaster affected areas? a. Coordanation its containing satellite phones b. Medicines for affected people c. Provides relief measures d. All the above

Last Answer : d. All the above

Description : A series of earthquakes shook the Central American Nation Of Nicarague and killed many people in the year? a. 1974 b. 1972 c, 1973 d. 1975

Last Answer : b. 1972

Description : What is it called when a large number of people in a community get a disease at the same time? a) Influx (b) Black death (c) Epidemic (d) Parasite

Last Answer : (c) Epidemic

Description : Mock drills exercise to create awareness among people are conducted at a. State level b. District level c. GP/Village level d. All of the above

Last Answer : d. All of the above

Description : Disaster management is aimed ata. Resettling people in the closest unaffected urban area a. Resettling people in the closest unaffected urban area b. Collection of valuable data for future ... a future disaster d. Restoring a communitys services, facilities and residences to pre-disaster levels

Last Answer : d. Restoring a communitys services, facilities and residences to pre-disaster levels

Description : If the city-killer asteroid that passed earth this week had actually hit, what part of the world would have been your choice to be obliterated?

Last Answer : Tulsa comes to mind as expendable. Or Dallas/Fort Worth.

Description : What was your worst cooking disaster?

Last Answer : I made turkey, mashed potatoes , and corn and carrots. No one came. I then decided to put BBQ sauce on the turkey and eat a quarter of it and a whole pot of mashed potatoes with creamed corn. I ... was good. I was expected to fail. I learned early not to cook on high unless you are boiling water.

Description : What does "two feet" mean in this context?

Last Answer : I always took that to mean two feet higher than the surface.

Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner

Last Answer : d. Walter Maner

Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these

Last Answer : b. Ethics

Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing

Last Answer : c. Power-point

Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these

Last Answer : a. Digital divide

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these

Last Answer : c. Plagiarism

Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these

Last Answer : b. Technophobes

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing

Last Answer : d. Alan Turing

Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English

Last Answer : b. Greek

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above

Last Answer : iii) Trademark

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these

Last Answer : i) Computer technology for vision and hearing

Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology

Last Answer : ii) Telepsychiatry

Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these

Last Answer : iv) All of these

Description : Computerized pharmacy are helpful for a common individual as i) They use robots and barcodes ii) They use ultrasound surgery iii) They can be used to diagnose a patient in a better way iv) None of these

Last Answer : i) They use robots and barcodes

Description : The drawbacks of ICT involves i) Foreign technology and culture are going heavy on our culture ii) Increased commitments to learning works iii) Learn more independently and at their own pace iv) Increase in self-directed learning and independence

Last Answer : i) Foreign technology and culture are going heavy on our culture

Description : ICT is helpful in i) Doing more amount of work and accomplishing the task quickly. ii) Analyzing information iii) Learning computer skills iv) All of these

Last Answer : iv) All of these

Description : ICT is used extensively in i) Wider access to learning and participation ii) Antisocial activities involving harassment of individuals iii) Flexibility to study where, when and how best suits individual needs and preferences iv) Both A & C

Last Answer : iv) Both A & C

Description : The use of computers, internet and other communication technologies to provide medical care to patients at distance is known as i) Telecommunication ii) Telemedicine iii) Expert systems iv) None of these

Last Answer : ii) Telemedicine