The term Tsunami is coined from?
a. Chinese term
b. Indian term
c. German term
d. Japanase term

1 Answer

Answer :

d. Japanase term

Related questions

Description : The Indian Tsunami Early Warning Centre (ITEWC) established at Indian National Centre for Ocean Information Sciences is located in (a) Chennai (b) Goa (c) Kochi (d) Hyderabad

Last Answer : (b) Goa

Description : Tsunami in the Indian Ocean occurred in the year (a) 2003 (b) 2004 (c) 2005 (d) 2006

Last Answer : (b) 2004

Description : Indian National Tsunami Warning System became operational in? a. 2003 b. 2007 c. 2009 d. 2012

Last Answer : b. 2007

Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner

Last Answer : d. Walter Maner

Description : The term "Cyclone " is derived from? a. Greek Word b. French Word c. Latin Word d. Chinese Word

Last Answer : a. Greek Word

Description : Tsunami is also known as (a) Tectonic Sea waves (b) Seismic Sea waves (c)Plactonic Sea waves (d) Systonic Sea waves

Last Answer : (b) Seismic Sea waves

Description : Tsunami is a (a) Japanese origin word (b) Latin origin word (c) Greek origin word (d) Portuguese origin word

Last Answer : (a) Japanese origin word

Description : Which of the following waves is the slowest a) Pwaves b) Swaves c) Surface waves d) Tsunami

Last Answer : d) Tsunami

Description : In which date tsunami occurred in Indoneshia – a) 24th April b) 26th March c) 26th Dec d) 27th Dec

Last Answer : c) 26th Dec

Description : Which is the most dangerous location for a tsunami hazard? a) A straight stretch of coast directly exposed to the open sea b) A rocky point protruding into the ocean in deep water c) A bay with a nice sandy beach at its end d) A small boat in the deep ocean

Last Answer : d) A small boat in the deep ocean

Description : As a tsunami approaches shallow water which of the following set of transformations occur? a) Wavelength increases, wave period decreases, and wave height stays the same b) Wavelength decreases, ... wave height increases d) Wavelength decreases, waver period stays the same, and wave height increases

Last Answer : d) Wavelength decreases, waver period stays the same, and wave height increases

Description : When did Tsunami struck the east coast of India in recent times? a) December 26, 2004 b) December 26, 2014 c) December 24, 2004 d) January 26, 1997

Last Answer : a) December 26, 2004

Description : International Tsunami Information Centre is in? a) Honolalu b) Goa c) Jakartha d) Pondicherry

Last Answer : a) Honolalu

Description : Tsunami is: a) Earthquake on land mass b) Volcanic eruption c) Earthquake in ocean crust d) None of these

Last Answer : c) Earthquake in ocean crust

Description : Earthquake under the sea is called? a. Tsunami b. Hurricane c. Cyclone d. Thunder

Last Answer : a. Tsunami

Description : 11-03-2012 marked one year sine an earthquake and tsunami killed thousands of people in? a. Japan b. South Korea c. North Korea d. Indonesia

Last Answer : a. Japan

Description : International Tsunami Information Centre is in? a. Honolulu b. Goa c. Jakartha d. Pondicherry

Last Answer : a. Honolulu

Description : Disaster at Chernobyl (USSR), Three Mile Island (USA), and Fukusima (JAPAN) are all related to: (a) Disaster caused by earthquake (b) Disaster caused by Tsunami (c) Nuclear disaster (d) Epidemic disaster

Last Answer : (c) Nuclear disaster

Description : Which of the following disasters can be triggered by an earthquake? a. Tsunami b. Intense ground shaking c. A landslide d. All of the above

Last Answer : d. All of the above

Description : The word disaster owes its origin from (a) Greek word (b) Latin word (c) French word (d) German word

Last Answer : (d) German word

Description : The word Hazards originated froma) Latin word b) Greek word c) French word. d) Indian word

Last Answer : c) French word.

Description : Which is the nodal agency at the Indian Union Government for coordinating disaster management activities for all natural hazards? a. Minister of Home affairs b. Ministry of social justice and Empowerment c. Ministry of Science and Technology d. Ministry of Environment and Forests

Last Answer : a. Minister of Home affairs

Description : National Institute of Disaster Management publishes a biannual journal titled? a. Disaster India b. Disaster Mitigation c. Disaster & Development d. Indian Disaster

Last Answer : c. Disaster & Development

Description : First Indian Disaster Management Congress was inaugurated on? a. 29-11-2006 b. 26-10-2006 c. 29-8-2006 d. 29-10-2006

Last Answer : a. 29-11-2006

Description : Area of Indian coastline which is vulnerable to storm surges, cyclones and tsunamis is? a. 5700 Km b. 3700km c. 2700km d. 4700km

Last Answer : a. 5700 Km

Description : How much percentage of Indian land is prone to earthquakes? a. 52% b. 54% c. 59% d. 60%

Last Answer : c. 59%

Description : How many of 35 Indian States and Union Territories are disaster prone? a. 23 b. 25 c. 12 d. 27

Last Answer : b. 25

Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English

Last Answer : b. Greek

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : The term “Disaster” is derived from which of the language (a) French (b) Arabic (c) Latin (d) Greek

Last Answer : (d) Greek

Description : The term cyclone means a) Coil of tiger b) Coil of snake c) Coil of lion d. Coli of pig

Last Answer : b) Coil of snake

Description : The term ‘disaster’ is derived from which of the following language? a. Greek b. Latin c. French d. Arabic

Last Answer : c. French

Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these

Last Answer : b. Ethics

Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing

Last Answer : c. Power-point

Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these

Last Answer : a. Digital divide

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these

Last Answer : c. Plagiarism

Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these

Last Answer : b. Technophobes

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing

Last Answer : d. Alan Turing

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above

Last Answer : iii) Trademark

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these

Last Answer : i) Computer technology for vision and hearing