Description : Peoples' having fear of using technology are called as a. Technician b. Technophobes c. both a & b d. None of the these
Last Answer : b. Technophobes
Description : Copying or stealing someone else's works or ideas and passing them off as your own work is reffered as a. Computer vandalism b. Computer fraud c. Plagiarism d. All of the these
Last Answer : c. Plagiarism
Description : Medicine technology have applications in the fields of i) Pharmacy ii) Prosthetics iii) Both A & B iv) None of these
Last Answer : iii) Both A & B
Description : ICT is used extensively in i) Wider access to learning and participation ii) Antisocial activities involving harassment of individuals iii) Flexibility to study where, when and how best suits individual needs and preferences iv) Both A & C
Last Answer : iv) Both A & C
Description : Teleconferencing can be helpful in i) Business Domain ii) Health Sector iii) Both A & B iv) None of these
Description : Bibliography given in a research report (i) Helps those interested in further research and studying the problem (ii) Makes the report authentic (iii) Both (i) & (ii) (iv) None of the above
Last Answer : (iii) Both (i) & (ii)
Description : Earthquake is- (a) A sudden shaking or vibration of ground (b) Disturbances in the earth’s crust (c) Both (a) & (b) (d) None of the above
Last Answer : (c) Both (a) & (b)
Description : Flood can be controlled by: a) Afforestation (b) Construction of dam (c) Both a & b (d) None of these
Last Answer : (c) Both a & b
Description : Method used to transfer information to far off places instantly is called i) Information technology ii) Language iii) Data iv) Telecommunication
Last Answer : iv) Telecommunication
Description : The term "Technology" has been derived from which of the following language? a. Latin b. Greek c. Spanish d. English
Last Answer : b. Greek
Description : Prosthetic Devices includes i) Computer technology for vision and hearing ii) Powerful IC iii) MRI Systems iv) None of these
Last Answer : i) Computer technology for vision and hearing
Description : The drawbacks of ICT involves i) Foreign technology and culture are going heavy on our culture ii) Increased commitments to learning works iii) Learn more independently and at their own pace iv) Increase in self-directed learning and independence
Last Answer : i) Foreign technology and culture are going heavy on our culture
Description : Which is the nodal agency at the Indian Union Government for coordinating disaster management activities for all natural hazards? a. Minister of Home affairs b. Ministry of social justice and Empowerment c. Ministry of Science and Technology d. Ministry of Environment and Forests
Last Answer : a. Minister of Home affairs
Description : National Institute of Disaster Management publishes a biannual journal titled? a. Disaster India b. Disaster Mitigation c. Disaster & Development d. Indian Disaster
Last Answer : c. Disaster & Development
Description : Using Teleconferencing to deliver psychotherapy is termed as i) Telepathology ii) Telepsychiatry iii) Telepsychology iv) Psychology
Last Answer : ii) Telepsychiatry
Description : The drawbacks of ICT in medicine are i) Part time staff may not be trained and cannot access vital information ii) Some staff may be resistant of using ICT iii) All staff will need training in the use of the software iv) All of these
Last Answer : iv) All of these
Description : What are the major types oriented to mitigation measures of hazards and disasters? a. Public mitigation measures b. Community mitigation measures c. Both a and b d. None of the above
Last Answer : c. Both a and b
Description : Which of the following statements is false? a. Earthquakes occur in plate boundaries b. The time and location of most major earthquakes can be predicted several days in advance c. Earthquakes can be ... reverse and strike-slip faulting d. P waves travel faster than both S waves and Surface waves
Last Answer : b. The time and location of most major earthquakes can be predicted several days in advance
Description : Which are the major controlling systems for reduction of volcanic disaster? a. Prediction for early warning of eruption b. Timely evolution and relief work c. Both a and b d. None of the above
Description : Which volcanic belt is commonly called “Ring of Fire”? (a) The Mid-Continental Belt (b) The Circum-Pacific Belt (c) The Mid-Atlantic Belt (d) The Circum- Continental Belt
Last Answer : (b) The Circum-Pacific Belt
Description : The sudden release of hot materials (lava, ash, gas etc.) from volcanoes is called (a) Volcanic eruption (b) Ash showers (c) Pyroclastic flows (d) Hot mud flows
Last Answer : (a) Volcanic eruption
Description : Sometimes there are some indications that would indicate that perhaps an earthquake would occur. Such indications are called (a) Indicators (b) Precursors (c) Signal (d) Anticipations
Last Answer : (b) Precursors
Description : Seismic waves during earthquake are recorded and studied with the help of an instrument called as (a) Richter scale (b) Seismograph (c) Lithograph (d) Cardiograph
Last Answer : (b) Seismograph
Description : A disease is called pandemic when it is (a) Within a region (b) Within a country (c) Within a continent (d) None of these
Last Answer : (c) Within a continent
Description : When magma reaches the surface of the earth, is called (a) Lava (b) Crater (c) Fissure (d) Clay
Last Answer : (a) Lava
Description : The place of origin an earth quake is called (a) Focus (b) Epicentre (c) Centre (d) Core
Last Answer : (a) Focus
Description : Volcanoes which are currently inactive but there is a possibility that it can erupt again in future are called (a) Dormant Volcanoes (b) Semi- Dormant Volcanoes (c) Extinct Volcanoes (d) Dead Volcanoes
Last Answer : (a) Dormant Volcanoes
Description : A cyclone is called a____________in Philippines and Japan. a) Hurricane b) Typhoon c) Tornado d) Thunderstorm
Last Answer : b) Typhoon
Description : A cyclone is called a________in the American Continent. a) Hurricane b) Typhoon c) Tornado d) Thunderstorm
Last Answer : a) Hurricane
Description : The centre of a cyclone is a calm area and is called the_________ of the storm. a) Eye b) Focus c) Centre d) Radius
Last Answer : a) Eye
Description : Earthquake under the sea is called? a. Tsunami b. Hurricane c. Cyclone d. Thunder
Last Answer : a. Tsunami
Description : What is it called when a large number of people in a community get a disease at the same time? a) Influx (b) Black death (c) Epidemic (d) Parasite
Last Answer : (c) Epidemic
Description : Below average rainfall for a prolonged period of time is called (a) Famine (b) Drought (c) Flood (d) None of these
Last Answer : (c) Flood
Description : Who coined the term "Computer ethics" as a branch of philosophy? a. Aryabhatt b. Grace Hoppers c. John Von Neumann d. Walter Maner
Last Answer : d. Walter Maner
Description : Pirating software is an act of violating a. Equity b. Ethics c. Law d. None of the these
Last Answer : b. Ethics
Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing
Last Answer : c. Power-point
Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these
Last Answer : a. Digital divide
Description : First Supercomputer developed in India is a. Aryabhatt b. Cray-1 c. PARAM d. IBM-370
Last Answer : c. PARAM
Description : Which of the following is known as father of modern computer? a. Dennis Ritchie b. John Napier c. Charles Babbage d. Alan Turing
Last Answer : d. Alan Turing
Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software
Last Answer : iii) Virus
Description : _________ is the measurement of things such as fingerprints and retinal scans used for security access. i) Biometrics ii) Bio measurement iii) Computer security iv) Smart weapon machinery
Last Answer : i) Biometrics
Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption
Last Answer : iv) Encryption
Description : The following can not be exploited by assigning or by licensing the rights to others. i) Patent ii) Designs iii) Trademark iv) All of the above
Last Answer : iii) Trademark
Description : The term 'Intellectual Property Rights' covers i) Copyrights ii) Know-how iii) Trade dress iv) All of the above
Last Answer : iv) All of the above
Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above
Description : The common name for the crime of stealing passwords is i) Jacking ii) Identify Theft iii) Spoofing iv) Hacking
Last Answer : iii) Spoofing
Description : Verification of a login name and password is known as i) Configuration ii) Accessibility iii) Authentication iv) logging in
Last Answer : iii) Authentication
Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm
Last Answer : iv) Worm
Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity
Last Answer : ii) Integrity
Description : Effects of Telemedicine results in i) Medical assistants at the remote sites ii) Small hospitals can have hardware costs reduced iii) Research study and scope for medical and cost effectiveness iv) All of these