Description : A hazard: A) is a potentially damaging physical event, phenomenon, or human activity B) may cause the loss of life or injury, property damage, C) may generate social and economic disruption or environmental degradation. D) all of the above
Last Answer : D) all of the above
Description : From the following, which one is the natural hazard? A) Earthquake B) Cyclone C) Landslide D) All the above
Last Answer : D) All the above
Description : Which one is a major environmental and safety hazard for the people in hilly areas in Tripura which can be considered as “cancer of hill slopes” a) Flood (b) Landslide (c) Earthquake (d) Desertification
Last Answer : (b) Landslide
Description : The process of identifying the probability of occurrence of a natural hazard of a given intensity at a specific location based on an analysis of natural processes and site conditions is termed as- (a) Disaster calculation (b) Hazard Assessment (c) Hazard calculation (d) None of the above
Last Answer : (b) Hazard Assessment
Description : An extreme natural phenomenon capable of causing disaster leading to loss of lives or damage to property is known as- (a) Natural hazard (b) Hazard calculation (c) Desertification (d) None of the above
Last Answer : (a) Natural hazard
Description : High vulnerability and high hazard are associated with (a) Low disaster risk (b) Medium disaster risk (c) High disaster risk (d) None of these
Last Answer : (c) High disaster risk
Description : Which is the most dangerous location for a tsunami hazard? a) A straight stretch of coast directly exposed to the open sea b) A rocky point protruding into the ocean in deep water c) A bay with a nice sandy beach at its end d) A small boat in the deep ocean
Last Answer : d) A small boat in the deep ocean
Description : Which natural hazard has caused the greatest number of deaths in a single event? a) Earthquakes b) Floods c) Volcanic eruptions and related disasters d)hurricanes
Last Answer : a) Earthquakes
Description : Of the following, which is a natural hazard? a. Earthquake b. Cyclone c. Landslide
Last Answer : b. Cyclone
Description : Man-made disasters include: a) Wars b) Terrorism c) Industrial hazard d) All of the above
Last Answer : d) All of the above
Description : Tropical cyclone, drought, wildfire is: (a) Industrial hazard (b) Man induced hazard (c) Meteorological hazard (d) Hydrological hazard
Last Answer : (c) Meteorological hazard
Description : Industrial hazards comes under the category of: (a) Natural hazards (b) Human induced hazards (c) Meteorological hazard (d) Wild fire hazard
Last Answer : (b) Human induced hazards
Description : What are the major Hazard/disaster management related activities? a. Preparedness b. Response c. Recovery d. All of the above
Last Answer : d. All of the above
Description : The NH-44 (presently 8) is affected by which hazard a. Floods b. Earthquake c. Landslide d. All of the above
Last Answer : c. Landslide
Description : Disaster is an event arising out of a. Result of hazard event b. Causes of hazard event c. Causes of disaster event d. All of the above
Last Answer : a. Result of hazard event
Description : A hazard is a situation where there is a. Threat of natural calamity b. Threat to property and lives from calamities c. Threat for consequences of disaster d. All of the above
Last Answer : b. Threat to property and lives from calamities
Description : What is the cause of tidal waves? a) Wind b) Gravitational force of the moon on the sea c) Gravitational force of the sun on the sea d) Gravitational force of the earth on the sea
Last Answer : d) Gravitational force of the earth on the sea
Description : One of the following is not a survey method (i) Personal interview (ii) Telephone interview (iii) Mail interview (iv) Structured observation
Last Answer : (iv) Structured observation
Description : Method used to transfer information to far off places instantly is called i) Information technology ii) Language iii) Data iv) Telecommunication
Last Answer : iv) Telecommunication
Description : A flood can vary in: (a) size (b) speed of water flow (c) duration (d) all of the above.
Last Answer : (d) all of the above.
Description : A flood can vary in: a) Size b) Speed of water flow c) Duration d) All of the above.
Last Answer : d) All of the above.
Description : Disasters can be categorized into various types on the basis of? a. Its speed b. Its previous history c. Loss of property they result d. Loss of human life they result
Last Answer : d. Loss of human life they result
Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner
Last Answer : d. Walter Maner
Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these
Last Answer : b. Ethics
Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing
Last Answer : c. Power-point
Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these
Last Answer : a. Digital divide
Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these
Last Answer : c. Plagiarism
Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these
Last Answer : b. Technophobes
Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370
Last Answer : c. PARAM
Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing
Last Answer : d. Alan Turing
Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English
Last Answer : b. Greek
Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software
Last Answer : iii) Virus
Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery
Last Answer : i) Biometrics
Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption
Last Answer : iv) Encryption
Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above
Last Answer : iii) Trademark
Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above
Last Answer : iv) All of the above
Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above
Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking
Last Answer : iii) Spoofing
Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in
Last Answer : iii) Authentication
Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm
Last Answer : iv) Worm
Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity
Last Answer : ii) Integrity
Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these
Last Answer : iii) Both A & B
Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these
Last Answer : i) Computer technology for vision and hearing
Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology
Last Answer : ii) Telepsychiatry
Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these
Last Answer : iv) All of these
Description : Computerized pharmacy are helpful for a common individual as i) They use robots and barcodes ii) They use ultrasound surgery iii) They can be used to diagnose a patient in a better way iv) None of these
Last Answer : i) They use robots and barcodes
Description : The drawbacks of ICT involves i) Foreign technology and culture are going heavy on our culture ii) Increased commitments to learning works iii) Learn more independently and at their own pace iv) Increase in self-directed learning and independence
Last Answer : i) Foreign technology and culture are going heavy on our culture
Description : ICT is helpful in i) Doing more amount of work and accomplishing the task quickly. ii) Analyzing information iii) Learning computer skills iv) All of these
Description : ICT is used extensively in i) Wider access to learning and participation ii) Antisocial activities involving harassment of individuals iii) Flexibility to study where, when and how best suits individual needs and preferences iv) Both A & C
Last Answer : iv) Both A & C
Description : The use of computers, internet and other communication technologies to provide medical care to patients at distance is known as i) Telecommunication ii) Telemedicine iii) Expert systems iv) None of these
Last Answer : ii) Telemedicine