Description : The term "Cyclone " is derived from? a. Greek Word b. French Word c. Latin Word d. Chinese Word
Last Answer : a. Greek Word
Description : From the following, which one is the natural hazard? A) Earthquake B) Cyclone C) Landslide D) All the above
Last Answer : D) All the above
Description : What is cyclone-? (a) A low pressure system with clockwise winds in the northern hemisphere. (b) A high pressure system with anticlockwise winds in the northern hemisphere. (c) A low pressure ... in the northern hemisphere. (d) A high pressure system with clockwise winds in the northern hemisphere.
Last Answer : (c) A low pressure system with anticlockwise winds in the northern hemisphere.
Description : Typhoons cyclone are formed in – a) India b) China c) Philipines d) Japan
Last Answer : b) China
Description : Hurricans cyclone are formed in a) U.S.A b) British Island c) Japan d) India
Last Answer : a) U.S.A
Description : Mention the major type of Tropical cyclone - a) Hurricans b) Typhoons c) Tornadoes d) All of these
Last Answer : d) All of these
Description : The eye of a cyclone is a) Cloudy and highly stormy. b) Full of strong winds. c) Calm and cloudless d) Site with high atmospheric pressure.
Last Answer : c) Calm and cloudless
Description : A cyclone is called a____________in Philippines and Japan. a) Hurricane b) Typhoon c) Tornado d) Thunderstorm
Last Answer : b) Typhoon
Description : A cyclone is called a________in the American Continent. a) Hurricane b) Typhoon c) Tornado d) Thunderstorm
Last Answer : a) Hurricane
Description : The centre of a cyclone is a calm area and is called the_________ of the storm. a) Eye b) Focus c) Centre d) Radius
Last Answer : a) Eye
Description : Earthquake under the sea is called? a. Tsunami b. Hurricane c. Cyclone d. Thunder
Last Answer : a. Tsunami
Description : The date when the super cyclone hit the Orissa coast which killed nearly 10,000 people and affected over 15 million people across 12 districts of Orissa is? a. 29.08.1999 b. 29.08.1997 c. 29.08.1998 d. 29.08.1996
Last Answer : a. 29.08.1999
Description : Of the following, which is a natural hazard? a. Earthquake b. Cyclone c. Landslide
Last Answer : b. Cyclone
Description : On November 19,1977, a cyclone, which had been operated to hit Tamil Nadu, instead struck the Central Coast of and diverted several villages? a. Kerela b. Andhra Pradesh c. Orissa d. Karnataka
Last Answer : b. Andhra Pradesh
Description : In which year a cyclone struck the Coastal Andhra in Krishna Godavari delta and caused havoc? a. 1976 b. 1979 c. 1978 d. 1977
Last Answer : d. 1977
Description : Which of the following is a disaster mitigation strategy? a. Constructing cyclone shelters b. Giving loans from banks c. Providing cheap electricity d. Providing school uniforms to children
Last Answer : a. Constructing cyclone shelters
Description : The cyclone 'SIDR' hit Bangladesh in? a. 2009 b. 2007 c. 2008 d. 2006
Last Answer : b. 2007
Description : In the eye of the cyclone the temperature is: a) Highest b) Lowest c) Normal d) Average
Last Answer : b) Lowest
Description : Tropical cyclone, drought, wildfire is: (a) Industrial hazard (b) Man induced hazard (c) Meteorological hazard (d) Hydrological hazard
Last Answer : (c) Meteorological hazard
Description : The cyclone that hit Odisha on October 29, 1999 is an example of (a) Super cyclone (b) Silent cyclone (c) Cyclone storm (d) None
Last Answer : (a) Super cyclone
Description : The centre of the cyclone is characterized by a. High Pressure b. Low pressure c. Very High Pressure d. All of the above
Last Answer : b. Low pressure
Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner
Last Answer : d. Walter Maner
Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English
Last Answer : b. Greek
Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above
Last Answer : iv) All of the above
Description : The term “Disaster” is derived from which of the language (a) French (b) Arabic (c) Latin (d) Greek
Last Answer : (d) Greek
Description : The term Tsunami is coined from? a. Chinese term b. Indian term c. German term d. Japanase term
Last Answer : d. Japanase term
Description : The term ‘disaster’ is derived from which of the following language? a. Greek b. Latin c. French d. Arabic
Last Answer : c. French
Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these
Last Answer : b. Ethics
Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing
Last Answer : c. Power-point
Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these
Last Answer : a. Digital divide
Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these
Last Answer : c. Plagiarism
Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these
Last Answer : b. Technophobes
Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370
Last Answer : c. PARAM
Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing
Last Answer : d. Alan Turing
Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software
Last Answer : iii) Virus
Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery
Last Answer : i) Biometrics
Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption
Last Answer : iv) Encryption
Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above
Last Answer : iii) Trademark
Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above
Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking
Last Answer : iii) Spoofing
Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in
Last Answer : iii) Authentication
Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm
Last Answer : iv) Worm
Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity
Last Answer : ii) Integrity
Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these
Last Answer : iii) Both A & B
Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these
Last Answer : i) Computer technology for vision and hearing
Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology
Last Answer : ii) Telepsychiatry
Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these
Last Answer : iv) All of these
Description : Computerized pharmacy are helpful for a common individual as i) They use robots and barcodes ii) They use ultrasound surgery iii) They can be used to diagnose a patient in a better way iv) None of these
Last Answer : i) They use robots and barcodes
Description : The drawbacks of ICT involves i) Foreign technology and culture are going heavy on our culture ii) Increased commitments to learning works iii) Learn more independently and at their own pace iv) Increase in self-directed learning and independence
Last Answer : i) Foreign technology and culture are going heavy on our culture
Description : ICT is helpful in i) Doing more amount of work and accomplishing the task quickly. ii) Analyzing information iii) Learning computer skills iv) All of these