Landslides occur because of?
a. Intensity of rainfall
b. Steep slopes
c. Deforestation leading it soil erosion
d. All the above

1 Answer

Answer :

d. All the above

Related questions

Description : Landslides occur because of A) Rainfall B) Steep slope C) Deforestation D) All of the above.

Last Answer : D) All of the above.

Description : Volcanic eruption are closely associated with a. Mountain building and fracturing b. Deforestation c. Landslides d. Heat budget

Last Answer : c. Landslides

Description : The human factors which cause floods are: (a) Deforestation (b) Heavy rainfall (c) Cloud burst (d) Large catchment area

Last Answer : (a) Deforestation

Description : Tsunamis are waves generated by? a. Earthquakes b. Volcanic eruptions c. Underwater landslides d. All of the above

Last Answer : d. All of the above

Description : Tsunamis are waves generated by? a. Earthquakes b. Volcanic eruptions c. Underwater landslides d. All the above

Last Answer : d. All the above

Description : The ground movements caused by earthquakes can have a damaging effects such as? a. Ground shaking b. Landslides c. Surface ruptures d. All the above

Last Answer : d. All the above

Description : Which of the following is an environmental consequence of floods? (a) dispersal of weed species (b) erosion of soil (c) release of pollutants into waterways (d) all of the above.

Last Answer : (d) all of the above.

Description : Which of the following is an environmental consequence of floods? a) Dispersal of weed species b) Erosion of soil c) Release of pollutants into waterways d) All of the above.

Last Answer : d) All of the above.

Description : Which one is a major environmental and safety hazard for the people in hilly areas in Tripura which can be considered as “cancer of hill slopes” a) Flood (b) Landslide (c) Earthquake (d) Desertification

Last Answer : (b) Landslide

Description : Deforestation during the recent decades has led to: (A) Soil erosion (B) Landslides (C) Loss of bio-diversity (D) All the above 

Last Answer : (D) All the above

Description : When forests are cut or burned down a) Water can flow away very quickly and cause mudslides b) Nutrients are washed deep into the soil c) Water stands in fields and cannot flow away d) Rainfall can get into the ground more quickly

Last Answer : a) Water can flow away very quickly and cause mudslides

Description : How can soil erosion be slowed on steep slopes?

Last Answer : By planting weeds, bushes, trees, etc., the roots help hold thesoil in place.

Description : Urbanization usually results in an increase in flood frequency because ___________. a) Less water is able to runoff in streams b) Less water is able to infiltrate into the ground, so instead is ... humans and then discharged to streams d) Rainfall is greater in urban areas than in rural areas

Last Answer : b) Less water is able to infiltrate into the ground, so instead is discharged rapidly into streams

Description : Dams are designed to reduce flooding by ____________. a) Protecting river banks from erosion b) Providing storage for flood water c) Increasing the downstream velocity of flood water ‘ d) Trapping sediment behind the dam so it can't be deposited downstream

Last Answer : b) Providing storage for flood water

Description : Channelization of streams is designed to reduce flooding by ___________. a) Speeding the passage of floodwaters b) Reducing bank erosion c) Slowing down river velocity so as to reduce damage d) Increase the meandering of streams

Last Answer : a) Speeding the passage of floodwaters

Description : Dams are designed to reduce flooding by _______________. a) Protecting river banks from erosion b) Providing storage for flood water c) Increasing the downstream velocity of flood water d) Trapping sediment behind the dam so it can't be deposited downstream

Last Answer : b) Providing storage for flood water

Description : An extreme natural phenomenon capable of causing disaster leading to loss of lives or damage to property is known as- (a) Natural hazard (b) Hazard calculation (c) Desertification (d) None of the above

Last Answer : (a) Natural hazard

Description : Which of the following is associated with a La Niña event? (a) The Southern Oscillation Index (SOI) is strongly negative. (b) The ocean surface off the coast of South America is warmer than usual. (c) There is an increased chance of above average rainfall in eastern Australia. (d) All of the above.

Last Answer : (c) There is an increased chance of above average rainfall in eastern Australia.

Description : Which of the following statements is false? a) Weather forecasts for a small region are more accurate than those for a large region b) Weather forecasts are more accurate in Melbourne than in Darwin c) Forecasts of temperature are more accurate than forecasts of rainfall d) All of the above

Last Answer : a) Weather forecasts for a small region are more accurate than those for a large region

Description : Below average rainfall for a prolonged period of time is called (a) Famine (b) Drought (c) Flood (d) None of these

Last Answer : (c) Flood

Description : The process of identifying the probability of occurrence of a natural hazard of a given intensity at a specific location based on an analysis of natural processes and site conditions is termed as- (a) Disaster calculation (b) Hazard Assessment (c) Hazard calculation (d) None of the above

Last Answer : (b) Hazard Assessment

Description : Sometimes there are some indications that would indicate that perhaps an earthquake would occur. Such indications are called (a) Indicators (b) Precursors (c) Signal (d) Anticipations

Last Answer : (b) Precursors

Description : As a tsunami approaches shallow water which of the following set of transformations occur? a) Wavelength increases, wave period decreases, and wave height stays the same b) Wavelength decreases, ... wave height increases d) Wavelength decreases, waver period stays the same, and wave height increases

Last Answer : d) Wavelength decreases, waver period stays the same, and wave height increases

Description : Earthquakes occur most frequently at a) Plate surface b) Plate boundaries c) Plate vacuum d) Ocean beds

Last Answer : b) Plate boundaries

Description : Earthquakes that occur along faults are created when ___________ a) Melted rock is erupted along the fault zone b) Stress builds up until rocks break c) The earth shifts and moves along fracture d) Answers b and c

Last Answer : d) Answers b and c

Description : In which month in India, floods are likely to occur? a. June-December b. June-September c. May-October d. Aril-June

Last Answer : b. June-September

Description : Tsunami’s can occur only during? a. Evening b. Afternoon c. Anytime in day or night d. Morning

Last Answer : c. Anytime in day or night

Description : Which of the following statements is false? a. Earthquakes occur in plate boundaries b. The time and location of most major earthquakes can be predicted several days in advance c. Earthquakes can be ... reverse and strike-slip faulting d. P waves travel faster than both S waves and Surface waves

Last Answer : b. The time and location of most major earthquakes can be predicted several days in advance

Description : Irrigation in India faces many problems. (a) Reduced water pollution and improved quality of water. (b) Deforestation leading to drought and reduction of rainfall. (c) A large quantity of water is not properly utilized. (d) All

Last Answer : (c) A large quantity of water is not properly utilized.

Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner

Last Answer : d. Walter Maner

Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these

Last Answer : b. Ethics

Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing

Last Answer : c. Power-point

Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these

Last Answer : a. Digital divide

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these

Last Answer : c. Plagiarism

Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these

Last Answer : b. Technophobes

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing

Last Answer : d. Alan Turing

Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English

Last Answer : b. Greek

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above

Last Answer : iii) Trademark

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these

Last Answer : i) Computer technology for vision and hearing