Passageway which joins vent to crater of volcano is known as
a) Vent
b) Cone
c) Pipe
d) Crater

1 Answer

Answer :

c) Pipe

Related questions

Description : When magma reaches the surface of the earth, is called (a) Lava (b) Crater (c) Fissure (d) Clay

Last Answer : (a) Lava

Description : Tremors that have occurred in Earth's crust are known as a) Earthquakes b) Volcanic eruptions c) Bed eruptions d) Volcano

Last Answer : a) Earthquakes

Description : Mt. Etna is a: a) Extinct volcano b) Dormant volcano c) Active volcano d) None of these

Last Answer : c) Active volcano

Description : The name of the largest active volcano is (a) Mauna Lao in Hawaii (b) Mount Washington in USA (c) Mount Fuje in Japan (d) Barren Island in India

Last Answer : (a) Mauna Lao in Hawaii

Description : Etna volcano are located in a) Japan b) Italy c) India d) Iran

Last Answer : b) Italy

Description : In which year the violent explosion of the famous Volcano, Krakatoa in Indonesia, produced Tsunamis measuring 40 feet? a. 1881 b. 1882 c. 1883 d. 1884

Last Answer : c. 1883

Description : In which year the violent explosion of the famous Volcano, Krakatoa in Indonesia, produced Tsunamis measuring 40 feet? a. 1883 b. 1881 c. 1882 d. 1884

Last Answer : a. 1883

Description : Mount Kilimanjaro is the best example of: a) Active volcano b) Dormant volcano c) Extinct volcano d) None of them

Last Answer : b) Dormant volcano

Description : The cup-shaped mouth of the volcano is (1) Focus (2) Epicentre (3) Crater (4) Cinder cone

Last Answer : (3) Crater Explanation: A bowl-shaped depression that is at the mouth of a volcano or geyser is called a volcanic crater. These craters are caused by the volcano's activity. It is a vent.

Description : The cup-shaped mouth of the volcano is (1) Focus (2) Epicentre (3) Crater (4) Cinder cone

Last Answer : Crater

Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing

Last Answer : d. Alan Turing

Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in

Last Answer : iii) Authentication

Description : The use of computers, internet and other communication technologies to provide medical care to patients at distance is known as i) Telecommunication ii) Telemedicine iii) Expert systems iv) None of these

Last Answer : ii) Telemedicine

Description : Tsunami is also known as (a) Tectonic Sea waves (b) Seismic Sea waves (c)Plactonic Sea waves (d) Systonic Sea waves

Last Answer : (b) Seismic Sea waves

Description : An extreme natural phenomenon capable of causing disaster leading to loss of lives or damage to property is known as- (a) Natural hazard (b) Hazard calculation (c) Desertification (d) None of the above

Last Answer : (a) Natural hazard

Description : Tenorist attack known as 9/11 took place in (a) India (b) USA (c) UK (d) None of the above.

Last Answer : (b) USA

Description : Amateur Radio is also known as? a. Ham radio b. Home radio c. Pocket radio d. Silent radio

Last Answer : a. Ham radio

Description : Cyclones in the Caribbean islands are known as: (a) Typhoon (b) Hurricanes (c) Tornadoes (d) Storm

Last Answer : (b) Hurricanes

Description : A point on the surface of the earth vertically above the focus is known as a. Epicenter b. Hypocenter c. Special focus d. None of the above

Last Answer : a. Epicenter

Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner

Last Answer : d. Walter Maner

Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these

Last Answer : b. Ethics

Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing

Last Answer : c. Power-point

Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these

Last Answer : a. Digital divide

Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these

Last Answer : c. Plagiarism

Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these

Last Answer : b. Technophobes

Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370

Last Answer : c. PARAM

Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English

Last Answer : b. Greek

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery

Last Answer : i) Biometrics

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above

Last Answer : iii) Trademark

Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above

Last Answer : iv) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking

Last Answer : iii) Spoofing

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these

Last Answer : i) Computer technology for vision and hearing

Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology

Last Answer : ii) Telepsychiatry

Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these

Last Answer : iv) All of these

Description : Computerized pharmacy are helpful for a common individual as i) They use robots and barcodes ii) They use ultrasound surgery iii) They can be used to diagnose a patient in a better way iv) None of these

Last Answer : i) They use robots and barcodes

Description : The drawbacks of ICT involves i) Foreign technology and culture are going heavy on our culture ii) Increased commitments to learning works iii) Learn more independently and at their own pace iv) Increase in self-directed learning and independence

Last Answer : i) Foreign technology and culture are going heavy on our culture

Description : ICT is helpful in i) Doing more amount of work and accomplishing the task quickly. ii) Analyzing information iii) Learning computer skills iv) All of these

Last Answer : iv) All of these

Description : ICT is used extensively in i) Wider access to learning and participation ii) Antisocial activities involving harassment of individuals iii) Flexibility to study where, when and how best suits individual needs and preferences iv) Both A & C

Last Answer : iv) Both A & C

Description : The drawbacks of ICT in medicine are i) Part time staff may not be trained and cannot access vital information ii) Some staff may be resistant of using ICT iii) All staff will need training in the use of the software iv) All of these

Last Answer : iv) All of these

Description : Managing a patients record can be helpful as i) The patients data can be easily shared between the doctors ii) The patients need to pay a heavy charge for maintain the records iii) It may be difficult to search and retrieve the patient’s records. iv) None of these

Last Answer : i) The patients data can be easily shared between the doctors

Description : Expert systems provides the functionalities of? i) The system provides medicine to the patients ii) The expert system consults the doctor immediately. iii) Medical staffs inputs patients symptoms iv) None of these

Last Answer : iii) Medical staffs inputs patients symptoms

Description : ICT is a combination of i) IT and Telecommunication ii) IT and Business iii) Information and Knowledge iv) None of These

Last Answer : i) IT and Telecommunication

Description : Teleconferencing can be helpful in i) Business Domain ii) Health Sector iii) Both A & B iv) None of these

Last Answer : iii) Both A & B

Description : ICT has been an essential necessity for i) Communication at long distances ii) Employing IT and its services to the rural areas iii) Providing medical help to nurses and staffs for treatments iv) All of these

Last Answer : iv) All of these