Description : Ebola virus disease first appeared in the year: a) 1976 b) 1967 c) 1956 d) 1926
Last Answer : a) 1976
Description : Andhra Pradesh was severely battered by a cyclonic storm killed more than 10,000 lives on? a. 15.11.1976 b. 15.11.1977 c. 15.11.1978 d. 15.11.1975
Last Answer : b. 15.11.1977
Description : In which year a cyclone struck the Coastal Andhra in Krishna Godavari delta and caused havoc? a. 1976 b. 1979 c. 1978 d. 1977
Last Answer : d. 1977
Description : The Indian Tsunami Early Warning Centre (ITEWC) established at Indian National Centre for Ocean Information Sciences is located in (a) Chennai (b) Goa (c) Kochi (d) Hyderabad
Last Answer : (b) Goa
Description : Mechanisms established under Disaster Management Act, 2005 include? a. National Disaster Management Authority b. State Disaster Management Authority c. District Disaster Management Authority d. All the above
Last Answer : d. All the above
Description : The National Civil Defence college was founded in 1957 at? a. Bombay b. Nagpur c. Cochin d. Hyderabad
Last Answer : b. Nagpur
Description : Which volcanic belt is commonly called “Ring of Fire”? (a) The Mid-Continental Belt (b) The Circum-Pacific Belt (c) The Mid-Atlantic Belt (d) The Circum- Continental Belt
Last Answer : (b) The Circum-Pacific Belt
Description : Industrial hazards comes under the category of: (a) Natural hazards (b) Human induced hazards (c) Meteorological hazard (d) Wild fire hazard
Last Answer : (b) Human induced hazards
Description : Example of anthropogenic hazards are: (a) Chemical explosion (b) Earthquake (c) Flood (d) Wild fire
Last Answer : (a) Chemical explosion
Description : The National flood Commission in India was set up in (a) 1980 (b) 1985 (c) 1995 (d) 1980
Last Answer : (a) 1980
Description : In Tripura, which nodal agency play crucial role in organising community capacity building programmes and conducting mock drills at State, District and Block levels (a) National Disaster ... Informatics Centre (c) District Disaster Management Authority (d) Tripura Disaster Management Authority
Last Answer : (a) National Disaster Response Force
Description : Choose the number of National Highway in Tripura – a) 45 b) 44 c) 46 d) 31
Last Answer : b) 44
Description : A Certificate course in Disaster Management is offered by? a. Indira Gandhi National Open University b. B.R. Ambedkar National Open University c. Nalanda Open University d. Vardhaman Mahavir Open University
Last Answer : a. Indira Gandhi National Open University
Description : National Institute of Disaster Management publishes a biannual journal titled? a. Disaster India b. Disaster Mitigation c. Disaster & Development d. Indian Disaster
Last Answer : c. Disaster & Development
Description : National Disaster Reserve Fund is the result of? a. 12th Finance Commission b. 11thFinance Commission c. 13th Finance Commission d. None of the above
Last Answer : b. 11thFinance Commission
Description : The Chairman of the National Disaster management Authority is? a. Home Minister b. Vice President c. Minister, Human Resource Development d. Prime Minister
Last Answer : d. Prime Minister
Description : The National Policy on Disaster Management was approved by the Union Cabinet in? a. 2008 b. 2009 c. 2007 d. 2010
Last Answer : b. 2009
Description : National Disaster Management Division of the Govt. of India wherever necessary, sends to disaster affected areas? a. Coordanation its containing satellite phones b. Medicines for affected people c. Provides relief measures d. All the above
Description : Indian National Tsunami Warning System became operational in? a. 2003 b. 2007 c. 2009 d. 2012
Last Answer : b. 2007
Description : National Institute of Disaster Management is at a. Manipur b. Punjab c. Hyderabad d. New Delhi
Last Answer : d. New Delhi
Description : The National Highway which passes through Tripura is: a) 4 b) 2 c) 8 d) 12
Last Answer : c) 8
Description : Which of the following agencies are the National Disaster Risk Reduction stakeholders? a. Central Government b. National Disaster Offices c. Private Sector d. All of the above
Last Answer : d. All of the above
Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner
Last Answer : d. Walter Maner
Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these
Last Answer : b. Ethics
Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing
Last Answer : c. Power-point
Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these
Last Answer : a. Digital divide
Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these
Last Answer : c. Plagiarism
Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these
Last Answer : b. Technophobes
Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370
Last Answer : c. PARAM
Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing
Last Answer : d. Alan Turing
Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English
Last Answer : b. Greek
Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software
Last Answer : iii) Virus
Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery
Last Answer : i) Biometrics
Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption
Last Answer : iv) Encryption
Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above
Last Answer : iii) Trademark
Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above
Last Answer : iv) All of the above
Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above
Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking
Last Answer : iii) Spoofing
Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in
Last Answer : iii) Authentication
Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm
Last Answer : iv) Worm
Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity
Last Answer : ii) Integrity
Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these
Last Answer : iii) Both A & B
Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these
Last Answer : i) Computer technology for vision and hearing
Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology
Last Answer : ii) Telepsychiatry
Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these
Last Answer : iv) All of these
Description : Computerized pharmacy are helpful for a common individual as i) They use robots and barcodes ii) They use ultrasound surgery iii) They can be used to diagnose a patient in a better way iv) None of these
Last Answer : i) They use robots and barcodes
Description : The drawbacks of ICT involves i) Foreign technology and culture are going heavy on our culture ii) Increased commitments to learning works iii) Learn more independently and at their own pace iv) Increase in self-directed learning and independence
Last Answer : i) Foreign technology and culture are going heavy on our culture
Description : ICT is helpful in i) Doing more amount of work and accomplishing the task quickly. ii) Analyzing information iii) Learning computer skills iv) All of these
Description : ICT is used extensively in i) Wider access to learning and participation ii) Antisocial activities involving harassment of individuals iii) Flexibility to study where, when and how best suits individual needs and preferences iv) Both A & C
Last Answer : iv) Both A & C
Description : The use of computers, internet and other communication technologies to provide medical care to patients at distance is known as i) Telecommunication ii) Telemedicine iii) Expert systems iv) None of these
Last Answer : ii) Telemedicine