The main objectives of First Aid?
a. To preserve life
b. To prevent the victims condition from worsening
c. To promote recovery
d. All the above

1 Answer

Answer :

d. All the above

Related questions

Description : What are the three phases of disaster management planning? (a) Evacuating, Rebuilding and Re-branding (b) Preparation, Planning and Perception (c) Planning, Evacuating and Recovery (d) Preparation, Response and Recovery

Last Answer : (d) Preparation, Response and Recovery

Description : What are the major Hazard/disaster management related activities? a. Preparedness b. Response c. Recovery d. All of the above

Last Answer : d. All of the above

Description : Disaster Management Team should include? a. Awareness generation team b. First aid team c. Search and Rescue team d. All of the above

Last Answer : d. All of the above

Description : First Aid Kit should contain? a. Cotton Wool, Bandage b. Pain Relievers, Medicines c. Scissors, Gloves, Antacids d. All the above

Last Answer : d. All the above

Description : First Aid it should contain? a. Cotton Wool, Crepre bandage b. Sterile dressing, pain reliever c. Scissors, Gloves, Antacids d. All the above

Last Answer : d. All the above

Description : Research design of a study should not include (i) Objectives (ii) Hypothesis (iii) Findings (iv) Blue print of Research

Last Answer : (iii) Findings

Description : Quantitative data refers to (i) Graphs and tables (ii) Any data you present in your report (iii) Statistical analysis (iv) Numerical data that could be useful to answer your research question(s) and to meet your Objectives

Last Answer : (iv) Numerical data that could be useful to answer your research question(s) and to meet your Objectives

Description : Disaster management is aimed ata. Resettling people in the closest unaffected urban area a. Resettling people in the closest unaffected urban area b. Collection of valuable data for future ... a future disaster d. Restoring a communitys services, facilities and residences to pre-disaster levels

Last Answer : d. Restoring a communitys services, facilities and residences to pre-disaster levels

Description : IPCC means (a) Intergovernmental Panel on Climate Change (b) Intergovernmental Panel on Climatic Condition (c) Intergovernmental Programme on Climate Change (d) International Panel on Climate Change

Last Answer : (a) Intergovernmental Panel on Climate Change

Description : In alpine regions reservoirs are created a) To regulate the flow of melting water from icefields b) To give the alpine populations enough water c) To make larger rivers smaller d) To get enough water into the main rivers

Last Answer : a) To regulate the flow of melting water from icefields

Description : What are the main prescribes procedures for standard operating? a. Search and rescue b. Medical assistant c. Casualty management d. All of the above

Last Answer : d. All of the above

Description : Field study is related to (i) Real life situations (ii) Experimental situations (iii) Laboratory situations (iv) None of the above

Last Answer : (i) Real life situations

Description : A hazard: A) is a potentially damaging physical event, phenomenon, or human activity B) may cause the loss of life or injury, property damage, C) may generate social and economic disruption or environmental degradation. D) all of the above

Last Answer : D) all of the above

Description : Name one wild life sanctuary in Tripura – a) Gomati b) Sipahijola c) Dharmanagar d) Agartala

Last Answer : b) Sipahijola

Description : On what date a powerful earthquake struck South Eastern Iran and Caused heavy loss of life and property? a. 26.12.2004 b. 26.12.2003 c. 26.12.2002 d. 25.11.2003

Last Answer : b. 26.12.2003

Description : When a powerful earthquake struck South Eastern Iran and caused enormous loss of life and property Killing 30,000 people? a. 26.12.2003 b. 26.11.2003 c. 26.10.2003 d. 26.10.2002

Last Answer : a. 26.12.2003

Description : Disasters can be categorized into various types on the basis of? a. Its speed b. Its previous history c. Loss of property they result d. Loss of human life they result

Last Answer : d. Loss of human life they result

Description : What are the consequences of disaster on a society? a. Loss of life b. Damage to property c. Environmental Damages d. All of the above

Last Answer : d. All of the above

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : Which of the following is the first step in starting the research process? (i) Searching sources of information to locate problem. (ii) Survey of related literature (iii) Identification of problem (iv) Searching for solutions to the problem

Last Answer : (ii) Survey of related literature

Description : What is the point or place that is the first to record the seismic waves? (a) Seismic point (b) Epicenter (c) Focal point (d) Epipoint

Last Answer : (b) Epicenter

Description : Name the first high school in Tripura – a) BBI b) Umakanta Academy c) RKI d) DNV

Last Answer : b) Umakanta Academy

Description : Name of the first lady Governor of Tripura - a) Dr. Kamala Beniwal b) Dr. Kajal Lal c) Dr. Partha Dey

Last Answer : a) Dr. Kamala Beniwal

Description : First Indian Disaster Management Congress was inaugurated on? a. 29-11-2006 b. 26-10-2006 c. 29-8-2006 d. 29-10-2006

Last Answer : a. 29-11-2006

Description : Ebola virus disease first appeared in the year: a) 1976 b) 1967 c) 1956 d) 1926

Last Answer : a) 1976

Description : Who shall be the first responders in disaster management situation? a. Central Government b. Community c. Local Government d. State Government

Last Answer : b. Community

Description : The first phase of environmental health management begins a. Long before a disaster strikes b. When a disaster strikes c. Within the first three hours after the disaster has struck d. After the warning period

Last Answer : a. Long before a disaster strikes

Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner

Last Answer : d. Walter Maner

Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these

Last Answer : b. Ethics

Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing

Last Answer : c. Power-point

Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these

Last Answer : a. Digital divide

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these

Last Answer : c. Plagiarism

Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these

Last Answer : b. Technophobes

Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing

Last Answer : d. Alan Turing

Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English

Last Answer : b. Greek

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above

Last Answer : iii) Trademark

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these

Last Answer : i) Computer technology for vision and hearing

Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology

Last Answer : ii) Telepsychiatry

Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these

Last Answer : iv) All of these

Description : Computerized pharmacy are helpful for a common individual as i) They use robots and barcodes ii) They use ultrasound surgery iii) They can be used to diagnose a patient in a better way iv) None of these

Last Answer : i) They use robots and barcodes