Name of the first lady Governor of Tripura -
a) Dr. Kamala Beniwal
b) Dr. Kajal Lal
c) Dr. Partha Dey

1 Answer

Answer :

a) Dr. Kamala Beniwal

Related questions

Description : Name the first high school in Tripura – a) BBI b) Umakanta Academy c) RKI d) DNV

Last Answer : b) Umakanta Academy

Description : Which one is a major environmental and safety hazard for the people in hilly areas in Tripura which can be considered as “cancer of hill slopes” a) Flood (b) Landslide (c) Earthquake (d) Desertification

Last Answer : (b) Landslide

Description : In Tripura, which nodal agency play crucial role in organising community capacity building programmes and conducting mock drills at State, District and Block levels (a) National Disaster ... Informatics Centre (c) District Disaster Management Authority (d) Tripura Disaster Management Authority

Last Answer : (a) National Disaster Response Force

Description : Name one wild life sanctuary in Tripura – a) Gomati b) Sipahijola c) Dharmanagar d) Agartala

Last Answer : b) Sipahijola

Description : Choose the number of National Highway in Tripura – a) 45 b) 44 c) 46 d) 31

Last Answer : b) 44

Description : How many Blocks are there in Tripura - a) 54 b) 58 c) 57 d) 51

Last Answer : b) 58

Description : How many sub divisions in Tripura - a) 25 b) 23 c) 24 d) 26

Last Answer : b) 23

Description : How many Districts in Tripura – a) 6 b) 8 c) 7 d) 3

Last Answer : b) 8

Description : In which year Tripura Legislative Assembly Election held – a) 18th Jan, 2018 b) 18th Feb, 2018 c) 1st Jan, 2018 d) 14th Feb, 2018

Last Answer : b) 18th Feb, 2018

Description : In India, highest percentage of damages causes by flood hazards – a) Uttar Pradesh b) Bihar c) West Bengal d) Tripura

Last Answer : b) Bihar

Description : The total geographical area of Tripura is: a) 183.5sq.km b) 10,491sq.km c) 8152sq.km d) 1200 sq.km

Last Answer : b) 10,491sq.km

Description : The highest peak of Tripura is: a) Betling Sib b) Jarimura c) Sakhan d) Longtarai

Last Answer : a) Betling Sib

Description : The Chairman of the Tripura Disaster Management Authority is: a) Chief Secretary b) District Magistrate c) Chief Minister d) BDO

Last Answer : c) Chief Minister

Description : The National Highway which passes through Tripura is: a) 4 b) 2 c) 8 d) 12

Last Answer : c) 8

Description : The epicenter of the earthquake of the magnitude of 5.7 which occurred on the 3rd of Jan, 2017 in Tripura was located at: a) Dhalai District b) West District c) North District d) Gomati District

Last Answer : a) Dhalai District

Description : The presence of high hill ranges with alternate valleys in Tripura is much similar to the “ridge-Vale topography” of a. The Manipur hills b. The Alps of Europe c. The Appalachian region of USA d. The Eastern Ghats of India

Last Answer : c. The Appalachian region of USA

Description : Which body in the state of Tripura can declare emergency in case of state level disaster? a. TDMA b. SEC c. Department of Public works d. Department of minister

Last Answer : a. TDMA

Description : "Kalbaisakhi”is a kind of thunder storm witnessed in the states of a. Nagaland, Tripura and Sikkim b. Mizoram, Assam and Manipur c. Assam, Tripura and West Bengal d. West Bengal, Manipur and Mizoram

Last Answer : c. Assam, Tripura and West Bengal

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : Which of the following is the first step in starting the research process? (i) Searching sources of information to locate problem. (ii) Survey of related literature (iii) Identification of problem (iv) Searching for solutions to the problem

Last Answer : (ii) Survey of related literature

Description : What is the point or place that is the first to record the seismic waves? (a) Seismic point (b) Epicenter (c) Focal point (d) Epipoint

Last Answer : (b) Epicenter

Description : Disaster Management Team should include? a. Awareness generation team b. First aid team c. Search and Rescue team d. All of the above

Last Answer : d. All of the above

Description : First Aid Kit should contain? a. Cotton Wool, Bandage b. Pain Relievers, Medicines c. Scissors, Gloves, Antacids d. All the above

Last Answer : d. All the above

Description : First Indian Disaster Management Congress was inaugurated on? a. 29-11-2006 b. 26-10-2006 c. 29-8-2006 d. 29-10-2006

Last Answer : a. 29-11-2006

Description : First Aid it should contain? a. Cotton Wool, Crepre bandage b. Sterile dressing, pain reliever c. Scissors, Gloves, Antacids d. All the above

Last Answer : d. All the above

Description : The main objectives of First Aid? a. To preserve life b. To prevent the victims condition from worsening c. To promote recovery d. All the above

Last Answer : d. All the above

Description : Ebola virus disease first appeared in the year: a) 1976 b) 1967 c) 1956 d) 1926

Last Answer : a) 1976

Description : Who shall be the first responders in disaster management situation? a. Central Government b. Community c. Local Government d. State Government

Last Answer : b. Community

Description : The first phase of environmental health management begins a. Long before a disaster strikes b. When a disaster strikes c. Within the first three hours after the disaster has struck d. After the warning period

Last Answer : a. Long before a disaster strikes

Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner

Last Answer : d. Walter Maner

Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these

Last Answer : b. Ethics

Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing

Last Answer : c. Power-point

Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these

Last Answer : a. Digital divide

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these

Last Answer : c. Plagiarism

Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these

Last Answer : b. Technophobes

Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing

Last Answer : d. Alan Turing

Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English

Last Answer : b. Greek

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above

Last Answer : iii) Trademark

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these

Last Answer : i) Computer technology for vision and hearing

Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology

Last Answer : ii) Telepsychiatry