An essential to the sanitary maintenance of latrines is
a. Sufficient supply of water
b. Supply of latrine construction materials
c. Health education program in latrine usage and upkeep
d. All of the above

1 Answer

Answer :

c. Health education program in latrine usage and upkeep

Related questions

Description : The phrase WEAPONS OF MASS DESTRUCTION entered widespread usage in? a. 2003 b. 2001 c. 2002 d. 2004

Last Answer : a. 2003

Description : The most essential item that the disaster stricken populations must be provided with is a. Shelter material b. Drinking water c. Fuel d. All of the above

Last Answer : b. Drinking water

Description : ICT has been an essential necessity for i) Communication at long distances ii) Employing IT and its services to the rural areas iii) Providing medical help to nurses and staffs for treatments iv) All of these

Last Answer : iv) All of these

Description : Flood can be controlled by: a) Afforestation (b) Construction of dam (c) Both a & b (d) None of these

Last Answer : (c) Both a & b

Description : The steps need to be taken for any risk natural or man-made disaster a. Proper building construction b. A well planned c. Awareness among the stakeholders d. All of the above

Last Answer : d. All of the above

Description : The sudden release of hot materials (lava, ash, gas etc.) from volcanoes is called (a) Volcanic eruption (b) Ash showers (c) Pyroclastic flows (d) Hot mud flows

Last Answer : (a) Volcanic eruption

Description : Engineering disaster is simply referred to those disasters when it is caused by an engineering failure like – (a) Design flaws or materials failures (b) Insufficient knowledge or underestimations (c) Carelessness or negligence (d) All the above.

Last Answer : (d) All the above.

Description : Which of the following can reduce the risk of flooding? a) Zonings and building regulations for new developments b) Dams, detention basins and levees c) Flood awareness and education programs d) All of the above.

Last Answer : d) All of the above.

Description : What are the roles of NGOs in disaster related preparedness stage? a. Public awareness and education b. Vulnerability and risk assessment c. Forming and training DNTs, introducing alternative technologies d. All of the above

Last Answer : d. All of the above

Description : Bad odour in sanitary latrines is reduced by periodically sprinkling (A) Bleaching powder (B) Lime powder (C) Aluminium sulphate (D) None of these

Last Answer : Option B

Description : Teleconferencing can be helpful in i) Business Domain ii) Health Sector iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : The primary goal of a disaster preparedness plan is: a) To protect the population b) To protect valuable resources c) To keep communications lines open d) To protect environmental health personnel

Last Answer : a) To protect the population

Description : The first phase of environmental health management begins a. Long before a disaster strikes b. When a disaster strikes c. Within the first three hours after the disaster has struck d. After the warning period

Last Answer : a. Long before a disaster strikes

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : Which of the following emits dangerous radioactive wastes forcing the government to eliminate its use? (a) Nuclear energy (b) Water energy (c) Geothermal energy (d) Solar energy

Last Answer : (a) Nuclear energy

Description : The size of a flood is measured by: (a) the rate of flow of water in a waterway or river (b) the level of water in a waterway or river (c) a river gauging station (d) all of the above.

Last Answer : (d) all of the above.

Description : When a river’s water level reaches 10 metres, this means that: (a) the water level is 10 metres above an arbitrary ‘zero’ level (b) the water level is 10 metres above mean sea level (c) the water level is 10 metres above mean sea level or an arbitrary 'zero' level (d) it will flood.

Last Answer : (c) the water level is 10 metres above mean sea level or an arbitrary 'zero' level

Description : A flood can vary in: (a) size (b) speed of water flow (c) duration (d) all of the above.

Last Answer : (d) all of the above.

Description : An important water contaminant is: (a) Heavy metals (b) Nitrogen oxides (c) Carbon monoxide (d) NO2 and SO2

Last Answer : (b) Nitrogen oxides

Description : When forests are cut or burned down a) Water can flow away very quickly and cause mudslides b) Nutrients are washed deep into the soil c) Water stands in fields and cannot flow away d) Rainfall can get into the ground more quickly

Last Answer : a) Water can flow away very quickly and cause mudslides

Description : In alpine regions reservoirs are created a) To regulate the flow of melting water from icefields b) To give the alpine populations enough water c) To make larger rivers smaller d) To get enough water into the main rivers

Last Answer : a) To regulate the flow of melting water from icefields

Description : Dams are designed to reduce flooding by ____________. a) Protecting river banks from erosion b) Providing storage for flood water c) Increasing the downstream velocity of flood water ‘ d) Trapping sediment behind the dam so it can't be deposited downstream

Last Answer : b) Providing storage for flood water

Description : Urbanization usually results in an increase in flood frequency because ___________. a) Less water is able to runoff in streams b) Less water is able to infiltrate into the ground, so instead is ... humans and then discharged to streams d) Rainfall is greater in urban areas than in rural areas

Last Answer : b) Less water is able to infiltrate into the ground, so instead is discharged rapidly into streams

Description : The size of a flood is measured by: a) The rate of flow of water in a waterway or river b) The level of water in a waterway or river c) A river gauging station d) All of the above.

Last Answer : d) All of the above.

Description : A flood can vary in: a) Size b) Speed of water flow c) Duration d) All of the above.

Last Answer : d) All of the above.

Description : Dams are designed to reduce flooding by _______________. a) Protecting river banks from erosion b) Providing storage for flood water c) Increasing the downstream velocity of flood water d) Trapping sediment behind the dam so it can't be deposited downstream

Last Answer : b) Providing storage for flood water

Description : Which is the most dangerous location for a tsunami hazard? a) A straight stretch of coast directly exposed to the open sea b) A rocky point protruding into the ocean in deep water c) A bay with a nice sandy beach at its end d) A small boat in the deep ocean

Last Answer : d) A small boat in the deep ocean

Description : As a tsunami approaches shallow water which of the following set of transformations occur? a) Wavelength increases, wave period decreases, and wave height stays the same b) Wavelength decreases, ... wave height increases d) Wavelength decreases, waver period stays the same, and wave height increases

Last Answer : d) Wavelength decreases, waver period stays the same, and wave height increases

Description : Disaster management is aimed ata. Resettling people in the closest unaffected urban area a. Resettling people in the closest unaffected urban area b. Collection of valuable data for future ... a future disaster d. Restoring a communitys services, facilities and residences to pre-disaster levels

Last Answer : d. Restoring a communitys services, facilities and residences to pre-disaster levels

Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner

Last Answer : d. Walter Maner

Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these

Last Answer : b. Ethics

Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing

Last Answer : c. Power-point

Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these

Last Answer : a. Digital divide

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these

Last Answer : c. Plagiarism

Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these

Last Answer : b. Technophobes

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing

Last Answer : d. Alan Turing

Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English

Last Answer : b. Greek

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above

Last Answer : iii) Trademark

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these

Last Answer : i) Computer technology for vision and hearing

Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology

Last Answer : ii) Telepsychiatry