How much of India’s coastline is vulnerable to Disasters?
a. ~ 5340km
b. ~ 5400km
c.~ 6200km
d. ~ 5700km

1 Answer

Answer :

d. ~ 5700km

Related questions

Description : Area of Indian coastline which is vulnerable to storm surges, cyclones and tsunamis is? a. 5700 Km b. 3700km c. 2700km d. 4700km

Last Answer : a. 5700 Km

Description : Which of the following group of people are more vulnerable in the event of a disaster (a) Men, boys, old people (b) Men, Women, boys (c) Women, children, Old people (d) None of these

Last Answer : (c) Women, children, Old people

Description : Special consideration in order to mitigate earthquake earthquake like disasters is given also to protect (a) Heritage buildings (b)Buildings of cultural and historical importance (c) Scientific and Technological laboratories (d) All of the above

Last Answer : (d) All of the above

Description : Which natural hazard has caused the greatest number of deaths in a single event? a) Earthquakes b) Floods c) Volcanic eruptions and related disasters d)hurricanes

Last Answer : a) Earthquakes

Description : According to U. N. O. there were about ______ disasters per year between 1992 - 2000 in the world? a. 100 b. 300 c. 500 d. 800

Last Answer : c. 500

Description : United Nations Disaster Management Team (UNDMT) is responsible for solving problem resulting from disasters in? a. Africa b. Asia c. Australia d. In all continents

Last Answer : d. In all continents

Description : According to World Bank Estimate, direct losses from natural disasters are upto percent of GDP? a. 4% b. 2% c. 1% d. 3%

Last Answer : b. 2%

Description : What percent of earthquakes and tsunamis account for world disasters? a. 8% b. 3% c. 9% d. 7%

Last Answer : a. 8%

Description : By what measures can we significantly reduce the impact of disasters on our people? a. Better planning b. Preparedness awareness c. Mitigation measures d. All the above

Last Answer : d. All the above

Description : According to the World Bank, during the period 1996 to 2000, the approximate percentage loss of gross domestic produce due to disasters was? a. 2.85% b. 2.25% c. 2.50% d.1.95%

Last Answer : b. 2.25%

Description : According to World Disasters Report of 2010, during 2000-09, 85% of affected people belonged to the? a. Asia Pacific Region b. African region c. Japan region d. Australian region

Last Answer : a. Asia Pacific Region

Description : U.N. Disaster Management Team UNDMT is responsible for solving problems resulting from disasters in? a. India b. Iran c. Bangladesh d. All countries the world

Last Answer : d. All countries the world

Description : Disasters can be categorized into various types on the basis of? a. Its speed b. Its previous history c. Loss of property they result d. Loss of human life they result

Last Answer : d. Loss of human life they result

Description : Disaster management coversa) Maintaining control over disasters b) Reducing the effects of disasters c) Briefing of govt. Officials about disasters d) All the above

Last Answer : d) All the above

Description : Man-made disasters include: a) Wars b) Terrorism c) Industrial hazard d) All of the above

Last Answer : d) All of the above

Description : Engineering disaster is simply referred to those disasters when it is caused by an engineering failure like – (a) Design flaws or materials failures (b) Insufficient knowledge or underestimations (c) Carelessness or negligence (d) All the above.

Last Answer : (d) All the above.

Description : The Bhopal gas tragedy is an example of: (a) Industrial disasters (b) Natural disasters (c) Nuclear disasters (d) None

Last Answer : (a) Industrial disasters

Description : What are the major types oriented to mitigation measures of hazards and disasters? a. Public mitigation measures b. Community mitigation measures c. Both a and b d. None of the above

Last Answer : c. Both a and b

Description : Which of the following disasters can be triggered by an earthquake? a. Tsunami b. Intense ground shaking c. A landslide d. All of the above

Last Answer : d. All of the above

Description : The typical examples of man-made disasters are a. Chemical explosion b. Leakage of toxic waste c. War and civil strife d. All of the above

Last Answer : d. All of the above

Description : Hazards and Disasters are mainly classified as a. Physical and chemical b. Natural and Human induced c. Physical and Human d. Social and cultural

Last Answer : b. Natural and Human induced

Description : This invention replaced vacuum tubes and made computers much smaller and faster. However, it was eventually replaced by another invention (i) RAM (ii) ENIAC (iii) Transformer (iv) Transistor.

Last Answer : (iv) Transistor.

Description : Warm air is ___________than cold air a) Heavier b) Lighter c) No difference in weight d) Very much lighter

Last Answer : a) Heavier

Description : How much percentage of Indian land is prone to earthquakes? a. 52% b. 54% c. 59% d. 60%

Last Answer : c. 59%

Description : The presence of high hill ranges with alternate valleys in Tripura is much similar to the “ridge-Vale topography” of a. The Manipur hills b. The Alps of Europe c. The Appalachian region of USA d. The Eastern Ghats of India

Last Answer : c. The Appalachian region of USA

Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner

Last Answer : d. Walter Maner

Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these

Last Answer : b. Ethics

Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing

Last Answer : c. Power-point

Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these

Last Answer : a. Digital divide

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these

Last Answer : c. Plagiarism

Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these

Last Answer : b. Technophobes

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing

Last Answer : d. Alan Turing

Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English

Last Answer : b. Greek

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above

Last Answer : iii) Trademark

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these

Last Answer : i) Computer technology for vision and hearing

Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology

Last Answer : ii) Telepsychiatry

Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these

Last Answer : iv) All of these

Description : Computerized pharmacy are helpful for a common individual as i) They use robots and barcodes ii) They use ultrasound surgery iii) They can be used to diagnose a patient in a better way iv) None of these

Last Answer : i) They use robots and barcodes

Description : The drawbacks of ICT involves i) Foreign technology and culture are going heavy on our culture ii) Increased commitments to learning works iii) Learn more independently and at their own pace iv) Increase in self-directed learning and independence

Last Answer : i) Foreign technology and culture are going heavy on our culture