A disease is called pandemic when it is
(a) Within a region
(b) Within a country
(c) Within a continent
(d) None of these

1 Answer

Answer :

(c) Within a continent

Related questions

Description : A pneumonic plague which occurred in Surat, Gujrat in 1994 is: (a) Pandemic disease hazards (b) Epidemic disease hazards (c) Industrial hazards (d) None of the above

Last Answer : (b) Epidemic disease hazards

Description : Pandemic disease is defined as: (a) Outbreak of a disease in international scale (b) Outbreak of a disease beyond the area of a disease (c) congestion in urban areas.

Last Answer : (a) Outbreak of a disease in international scale

Description : Pandemic diseases include: (a) Cholera (b) Small pox (c) Tubercolosis (d) All of the above

Last Answer : (d) All of the above

Description : A cyclone is called a________in the American Continent. a) Hurricane b) Typhoon c) Tornado d) Thunderstorm

Last Answer : a) Hurricane

Description : Which of the following statements is false? a) Weather forecasts for a small region are more accurate than those for a large region b) Weather forecasts are more accurate in Melbourne than in Darwin c) Forecasts of temperature are more accurate than forecasts of rainfall d) All of the above

Last Answer : a) Weather forecasts for a small region are more accurate than those for a large region

Description : Equator is a region of _______ pressure while poles are regions of _____pressure a) High, low b) Low, high c) Low, low d) High, high

Last Answer : a) High, low

Description : According to World Disasters Report of 2010, during 2000-09, 85% of affected people belonged to the? a. Asia Pacific Region b. African region c. Japan region d. Australian region

Last Answer : a. Asia Pacific Region

Description : The presence of high hill ranges with alternate valleys in Tripura is much similar to the “ridge-Vale topography” of a. The Manipur hills b. The Alps of Europe c. The Appalachian region of USA d. The Eastern Ghats of India

Last Answer : c. The Appalachian region of USA

Description : The point within the earth where earthquake generated is called a) Focus of epicenter b) Focus of foci c) Focus of hypocenter d) None of these

Last Answer : c) Focus of hypocenter

Description : The first phase of environmental health management begins a. Long before a disaster strikes b. When a disaster strikes c. Within the first three hours after the disaster has struck d. After the warning period

Last Answer : a. Long before a disaster strikes

Description : What is it called when a large number of people in a community get a disease at the same time? a) Influx (b) Black death (c) Epidemic (d) Parasite

Last Answer : (c) Epidemic

Description : Which metal is causing for Minamata disease - a) Iron b) Mercury c) Gold d) Silver

Last Answer : b) Mercury

Description : Full form of DDMA – a) District Disaster Management Authority b) District Disease Manage Authority c) District Dam Manage Authority d) District Duck Management Authority

Last Answer : a) District Disaster Management Authority

Description : TB disease generally affects of a) Kidney b) Stomach c) Lungs d) Skin

Last Answer : c) Lungs

Description : Full form of EVDa) Ebola Virus Disease b) Evoc Virus Disease c) Evola voc Disease d) Evola Vig Disease

Last Answer : a) Ebola Virus Disease

Description : Ebola virus disease first appeared in the year: a) 1976 b) 1967 c) 1956 d) 1926

Last Answer : a) 1976

Description : The disease that swept a large part of Asia, Europe and Africa in the 14th century is: (a) Plague (b) Small pox (c) Tuberculosis (d) Influenza

Last Answer : (a) Plague

Description : The major risk associated with overcrowding is a. Proliferation of mosquito breeding sites b. Heightened exposure to decaying matter c. Creation of nuisance problems d. Increase in diarrhea disease

Last Answer : d. Increase in diarrhea disease

Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these

Last Answer : b. Technophobes

Description : Method used to transfer information to far off places instantly is called i) Information technology ii) Language iii) Data iv) Telecommunication

Last Answer : iv) Telecommunication

Description : Which volcanic belt is commonly called “Ring of Fire”? (a) The Mid-Continental Belt (b) The Circum-Pacific Belt (c) The Mid-Atlantic Belt (d) The Circum- Continental Belt

Last Answer : (b) The Circum-Pacific Belt

Description : The sudden release of hot materials (lava, ash, gas etc.) from volcanoes is called (a) Volcanic eruption (b) Ash showers (c) Pyroclastic flows (d) Hot mud flows

Last Answer : (a) Volcanic eruption

Description : Sometimes there are some indications that would indicate that perhaps an earthquake would occur. Such indications are called (a) Indicators (b) Precursors (c) Signal (d) Anticipations

Last Answer : (b) Precursors

Description : Seismic waves during earthquake are recorded and studied with the help of an instrument called as (a) Richter scale (b) Seismograph (c) Lithograph (d) Cardiograph

Last Answer : (b) Seismograph

Description : When magma reaches the surface of the earth, is called (a) Lava (b) Crater (c) Fissure (d) Clay

Last Answer : (a) Lava

Description : The place of origin an earth quake is called (a) Focus (b) Epicentre (c) Centre (d) Core

Last Answer : (a) Focus

Description : Volcanoes which are currently inactive but there is a possibility that it can erupt again in future are called (a) Dormant Volcanoes (b) Semi- Dormant Volcanoes (c) Extinct Volcanoes (d) Dead Volcanoes

Last Answer : (a) Dormant Volcanoes

Description : A cyclone is called a____________in Philippines and Japan. a) Hurricane b) Typhoon c) Tornado d) Thunderstorm

Last Answer : b) Typhoon

Description : The centre of a cyclone is a calm area and is called the_________ of the storm. a) Eye b) Focus c) Centre d) Radius

Last Answer : a) Eye

Description : Earthquake under the sea is called? a. Tsunami b. Hurricane c. Cyclone d. Thunder

Last Answer : a. Tsunami

Description : Below average rainfall for a prolonged period of time is called (a) Famine (b) Drought (c) Flood (d) None of these

Last Answer : (c) Flood

Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner

Last Answer : d. Walter Maner

Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these

Last Answer : b. Ethics

Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing

Last Answer : c. Power-point

Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these

Last Answer : a. Digital divide

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these

Last Answer : c. Plagiarism

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing

Last Answer : d. Alan Turing

Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English

Last Answer : b. Greek

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above

Last Answer : iii) Trademark

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these

Last Answer : iii) Both A & B