Description : In which year the violent explosion of the famous Volcano, Krakatoa in Indonesia, produced Tsunamis measuring 40 feet? a. 1881 b. 1882 c. 1883 d. 1884
Last Answer : c. 1883
Description : Tsunamis are waves generated by? a. Earthquakes b. Volcanic eruptions c. Underwater landslides d. All of the above
Last Answer : d. All of the above
Description : What percent of earthquakes and tsunamis account for world disasters? a. 8% b. 3% c. 9% d. 7%
Last Answer : a. 8%
Description : Area of Indian coastline which is vulnerable to storm surges, cyclones and tsunamis is? a. 5700 Km b. 3700km c. 2700km d. 4700km
Last Answer : a. 5700 Km
Description : In which year the violent explosion of the famous Volcano, Krakatoa in Indonesia, produced Tsunamis measuring 40 feet? a. 1883 b. 1881 c. 1882 d. 1884
Last Answer : a. 1883
Description : Tsunamis are waves generated by? a. Earthquakes b. Volcanic eruptions c. Underwater landslides d. All the above
Last Answer : d. All the above
Description : Earthquakes and tsunamis constitute disaster percentage = ..? a. 8% b. 4% c. 6% d. 17%
Description : Landslides occur because of A) Rainfall B) Steep slope C) Deforestation D) All of the above.
Last Answer : D) All of the above.
Description : Sometimes there are some indications that would indicate that perhaps an earthquake would occur. Such indications are called (a) Indicators (b) Precursors (c) Signal (d) Anticipations
Last Answer : (b) Precursors
Description : As a tsunami approaches shallow water which of the following set of transformations occur? a) Wavelength increases, wave period decreases, and wave height stays the same b) Wavelength decreases, ... wave height increases d) Wavelength decreases, waver period stays the same, and wave height increases
Last Answer : d) Wavelength decreases, waver period stays the same, and wave height increases
Description : Earthquakes occur most frequently at a) Plate surface b) Plate boundaries c) Plate vacuum d) Ocean beds
Last Answer : b) Plate boundaries
Description : Earthquakes that occur along faults are created when ___________ a) Melted rock is erupted along the fault zone b) Stress builds up until rocks break c) The earth shifts and moves along fracture d) Answers b and c
Last Answer : d) Answers b and c
Description : In which month in India, floods are likely to occur? a. June-December b. June-September c. May-October d. Aril-June
Last Answer : b. June-September
Description : Landslides occur because of? a. Intensity of rainfall b. Steep slopes c. Deforestation leading it soil erosion d. All the above
Description : Which of the following statements is false? a. Earthquakes occur in plate boundaries b. The time and location of most major earthquakes can be predicted several days in advance c. Earthquakes can be ... reverse and strike-slip faulting d. P waves travel faster than both S waves and Surface waves
Last Answer : b. The time and location of most major earthquakes can be predicted several days in advance
Description : Herbicides prone to photodecomposition such as Trifluralin, monuron, chloramben and PCP should be applied in a). Morning b). Evening c). Afternoon d). all
Last Answer : b). Evening
Description : Which of the following is used to estimate which areas will be inundated during a flood, based on river height information? (a) satellite and radar images (b) flood maps / floodplain hydraulic models (c) river gauging stations (d) all of the above.
Last Answer : (b) flood maps / floodplain hydraulic models
Description : Seismic waves during earthquake are recorded and studied with the help of an instrument called as (a) Richter scale (b) Seismograph (c) Lithograph (d) Cardiograph
Last Answer : (b) Seismograph
Description : An enormous amount of energy is released during an earthquake as seismic waves which are of (a) Primary or pressure waves(P-waves) (b) Secondary or transverse waves(S-waves) (c) Long waves or surface waves(L-waves) (d) All of the above
Last Answer : (d) All of the above
Description : Which one of the following is NOT re commended during Lightening or thunderstorm? a) Take Shelter in a bus or car. b) In a forest , seek shelter in a low area under a thick growth of small trees. c) Take shelter under isolated tree. d) Get away from tractors and other metal farm equipment .
Last Answer : c) Take shelter under isolated tree.
Description : Which of the following activities is covered by Disaster management before, during or after a disaster? a) Reconstruction and Rehabilitation b) Mitigation c) Emergency response d) All the above
Last Answer : d) All the above
Description : According to the World Bank, during the period 1996 to 2000, the approximate percentage loss of gross domestic produce due to disasters was? a. 2.85% b. 2.25% c. 2.50% d.1.95%
Last Answer : b. 2.25%
Description : According to World Disasters Report of 2010, during 2000-09, 85% of affected people belonged to the? a. Asia Pacific Region b. African region c. Japan region d. Australian region
Last Answer : a. Asia Pacific Region
Description : Which of the following activities is covered by Disaster Management before, during or after a disaster? a. Reconstruction and Rehabilitation b. Mitigation c. Emergency response d. All the above
Description : Number of human live lost during 1980-2010 due to natural and induced hazards in India? a. 1,42,265 b. 1,56,897 c. 1,43,039 d. 1,23,987
Last Answer : c. 1,43,039
Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity
Last Answer : ii) Integrity
Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner
Last Answer : d. Walter Maner
Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these
Last Answer : b. Ethics
Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing
Last Answer : c. Power-point
Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these
Last Answer : a. Digital divide
Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these
Last Answer : c. Plagiarism
Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these
Last Answer : b. Technophobes
Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370
Last Answer : c. PARAM
Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing
Last Answer : d. Alan Turing
Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English
Last Answer : b. Greek
Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software
Last Answer : iii) Virus
Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery
Last Answer : i) Biometrics
Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption
Last Answer : iv) Encryption
Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above
Last Answer : iii) Trademark
Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above
Last Answer : iv) All of the above
Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above
Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking
Last Answer : iii) Spoofing
Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in
Last Answer : iii) Authentication
Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm
Last Answer : iv) Worm
Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these
Last Answer : iii) Both A & B
Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these
Last Answer : i) Computer technology for vision and hearing
Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology
Last Answer : ii) Telepsychiatry
Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these
Last Answer : iv) All of these
Description : Computerized pharmacy are helpful for a common individual as i) They use robots and barcodes ii) They use ultrasound surgery iii) They can be used to diagnose a patient in a better way iv) None of these
Last Answer : i) They use robots and barcodes
Description : The drawbacks of ICT involves i) Foreign technology and culture are going heavy on our culture ii) Increased commitments to learning works iii) Learn more independently and at their own pace iv) Increase in self-directed learning and independence
Last Answer : i) Foreign technology and culture are going heavy on our culture