The primary goal of planning for disasters is to reduce – (1) Death (2) Damage (3) Risk (4) Vulnerability

1 Answer

Answer :

(4) Vulnerability Explanation: Disaster planning is the creation of plans through which communities reduce vulnerability to hazards and cope with disasters. It does not avert or eliminate the threats; instead it focuses on creating plans to decrease the impact of disasters.

Related questions

Description : The primary goal of planning for disasters is to reduce (1) Death (2) Damage (3) Risk (4) Vulnerability

Last Answer : Vulnerability

Description : By what measures can we significantly reduce the impact of disasters on our people? a. Better planning b. Preparedness awareness c. Mitigation measures d. All the above

Last Answer : d. All the above

Description : High vulnerability and high hazard are associated with (a) Low disaster risk (b) Medium disaster risk (c) High disaster risk (d) None of these

Last Answer : (c) High disaster risk

Description : Flood risk refers to: a) The chance of a flood occurring b) The number of people and properties exposed to floodwaters if a flood occurs c) The vulnerability of people and properties that are exposed to floodwaters d) All of the above.

Last Answer : d) All of the above.

Description : What are the roles of NGOs in disaster related preparedness stage? a. Public awareness and education b. Vulnerability and risk assessment c. Forming and training DNTs, introducing alternative technologies d. All of the above

Last Answer : d. All of the above

Description : Globalization can create problems for business because: A. It can result in more competition. B. It reduced vulnerability to political risk and uncertainty when operating abroad. C. It means that they can increase prices. D. All the options given are correct.

Last Answer : All the options given are correct.

Description : ................ is used in game trees to reduce the number of branches of the search tree to be traversed without affecting the solution. (A) Best first search (B) Goal stack planning (C) Alpha-beta pruning procedure (D) Min-max search

Last Answer : (C) Alpha-beta pruning procedure

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : During the planning development process, at times it is necessary to make certain assumptions to enhance the project plan when the data is not available. In regard to making those assumptions, ... upon historical data used for the project.  4. Senior management predefines the budget constraints.

Last Answer : 1. The assumptions will be considered as true, real, or certain.

Description : The main goal of HDFS High availability is a) Faster creation of the replicas of primary namenode. b) To reduce the cycle time required to bring back a new primary namenode after existing ... data loss due to failure of primary namenode. d) Prevent the primary namenode form becoming single point

Last Answer : To reduce the cycle time required to bring back a new primary namenode after existing primary fails.

Description : Coastal Andhra Pradesh and Orissa often face natural disasters due to: [CPO SI 2003] (a) cyclones (b) earthquakes (c) landslides (d) tornadoes

Last Answer : Ans: (a)

Description : Coastal Andhra Pradesh and Orissa often face natural disasters due to – (1) Cyclones (2) Earthquakes (3) Landslides (4) Tornadoes

Last Answer : (1) Cyclones Explanation: During summer, the Bay of Bengal is subject to intense heating, giving rise to humid and unstable air masses that produce cyclones. Widespread death and property destruction are ... Bay of Bengal, over 58 percent approach and cross the east coast in October and November.

Description : By what percentage do seatbelts reduce the risk of death for a person sitting in front seat? a) 40% b) 50% c) 60% d) 70%

Last Answer : b) 50%

Description : In post-myocardial infarction and other high cardiovascular risk subjects but without hypertension or heart failure, prolonged ACE inhibitor medication has been found to: A. Increase the chances of sudden cardiac death ... Lower the risk of developing heart failure and diabetes D. Both B and C'

Last Answer : D. Both ‘B‘ and ‘C

Description : How can we reduce man_made disasters in a library? -Technology

Last Answer : There are certain human activities which destroy the library resources. Such activities may be intentional, unintentional or due to ignorance towards the upkeep of building and its parts, equipments and ... in the library. As far as possible conditions like war and invasion should be avoided.

Description : Action taken to reduce or avoid disasters and their effects is ……………….. 

Last Answer : Choose the correct option by identifying the correct correlation in the sentence: Action taken to reduce ... (c) rehabilitation (d) mitigation

Description : One of the primary roles of an audit program is to a. Provide for a standardized approach to the audit engagement. b. Serve as a tool for planning, directing, and controlling audit work. c ... an auditor's understanding of the internal control. d. Delineate the audit risk accepted by the auditor

Last Answer : Serve as a tool for planning, directing, and controlling audit work

Description : The primary objective for designing drugs that selectively inhibit COX - 2 is to (a) Decrease the risk of nephrotoxicity (b) Improve anti-inflammatory effectiveness (c) Lower the ... of treatment of rheumatoid arthritis (e) Selectively decrease thromboxane A2 without effects on other eicosanoids

Last Answer : Ans: C

Description : What are the differences between threat, vulnerability, and consequence in the context of cybersecurity?

Last Answer : Those are academic terms, or possibly professional cybersecurity lingo. I'm a software developer, but have only done a few projects in cybersecurity, and I don't follow the academic or industry terminology very ... Update, or a DDOS attack. Could be ignorant users who don't know what they're doing.

Description : Is it bad to show your boss vulnerability?

Last Answer : answer:I have been a boss and I love nothing more than a person admitting they didn't know and then asking for help to avoid a similar situation in the future. I do prefer if you ask before ... Don't waste their time with your insecurities. Find the problem, fix the problem and move the fuck on.

Description : Are a vulnerability & a weakness the same thing?

Last Answer : answer:I have a weakness in my lower back do to congential abnormalities. I am vulnerable to friends asking for financial loans (when I know they will not repay me). I am vulnerable to cats and dogs ... remove two wasps who flew inside (by paper cup and lid and release them back into the outdoors).

Description : Is vulnerability strength or foolishness?

Last Answer : Emotional vulnerability is a sine qua non of a mature, loving relationship, and it is very rewarding, as well.

Description : vulnerability can be defined as -General Knowledge

Last Answer : Vulnerability can be defined as: the diminished capacity of an individual or group to anticipate, cope with, resist and recover from the impact of a natural or man-made hazard.

Description : What is meant by ‘ Vulnerability’ to poverty? Which economic categories are more vulnerable to poverty in India. -Economics 9th

Last Answer : Economic categories more vulnerable to poverty in India: Schedule tribes, urban casual labourers, rural agriculture labourers, scheduled castes are major economic groups, which are more vulnerable to poverty ... tribes contribute to 51% of poverty in India which average Indian poverty ratio is 26.

Description : What is the difference between vulnerability from hazards?

Last Answer : Need answer

Description : Which zone is considered the highest vulnerability zone of the seismic zonation map of India? (a) Zone-IV (b) Zone-V (c) Zone-III (d) Zone-

Last Answer : (b) Zone-V

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : A/an ______ is a system susceptibility or flaw: a) Error b) Vulnerability c) Virus d) None of These

Last Answer : b) Vulnerability

Description : ______was the first technique that posed a serious threat to virus scanners: a) Vulnerability Code b) Polymorphic Code c) Antimorphic Code d) None of These

Last Answer : b) Polymorphic Code

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : .Fluoridation is the adjustment of the fluoride content of a community water supply to optimum levels for caries prevention. Which of the following statement is correct? A. Tooth decay ... in smooth surface caries from in pit and fissures D. Fluoridation increases vulnerability to osteoporosis

Last Answer : C. Greater reduction in smooth surface caries from in pit and fissures

Description : OOP features are i) Increasing productivity ii) Reusability iii) Decreasing maintenance cost iv) High vulnerability A) 1,2 & 4 B) 1,2 & 3

Last Answer : B) 1,2 & 3

Description : Vulnerability scanning in Ethical hacking finds a) Strengths b) Weakness c) a & b d) None of these

Last Answer : b) Weakness

Description : Vulnerability scanning in Ethical hacking finds………. a. Strengths b. Weakness c. A&B d. None of these

Last Answer : b. Weakness

Description : What are the three phases of a security evaluation plan? (Choose three answers.) A. Conduct Security Evaluation B. Preparation C. Conclusion D. Final E. Reconnaissance F. Design Security G. Vulnerability Assessment

Last Answer : A. Conduct Security Evaluation B. Preparation C. Conclusion

Description : Vulnerability scanning in Ethical hacking finds_____. A. Strengths. B. Weakness. C. A &B D. None of these.

Last Answer : B. Weakness.

Description : What are the three phases of a security evaluation plan? (Choose three answers.) A. Conduct Security Evaluation B. Preparation C. Conclusion D. Final E. Reconnaissance F. Design Security G. Vulnerability Assessment

Last Answer : A. Conduct Security Evaluation B. Preparation C. Conclusion

Description : What are the three phases of a security evaluation plan? (Choose three answers.) ∙ A. Conduct Security Evaluation ∙ B. Preparation ∙ C. Conclusion ∙ D. Final ∙ E. Reconnaissance ∙ F. Design Security ∙ G. Vulnerability Assessment

Last Answer : A. Conduct Security Evaluation B. Preparation C. Conclusion

Description : Which of the following was not given by Janis as a symptom of groupthink? (a) Pressure to conform ; (b) An awareness of vulnerability (c) Negative stereotypes of outside opponents ; (d) An illusion of unanimity

Last Answer : (b) An awareness of vulnerability

Description : Give an example of when you took a risk to achieve a goal. What was the outcome?

Last Answer : Taking a risk is good, as long as it doesn't put the company at risk of lawsuits or losing a lot of money. Give an example where risk paid o.

Description : How do you do Goal Planning?

Last Answer : Everyone has some type of goal in life whether it is for your budget, school, or even life. When I was younger and in school and working I sat down and made a goal for myself. I wanted to see myself ... . The timelines really helped me to focus and see what I wanted to do and where I wanted to be.

Description : Planning is a ------------ process A. Goal Oriented B. Flexible C. Time bound D. All of these

Last Answer : D. All of these

Description : According to this lesson, what term is the way for commanders to adhere to LoW by weighing risk of collateral damage against military necessity and proportionality within the framework of the military decision-making process?

Last Answer : Collateral Damage Estimation Methodology (CDM)

Description : There is a greater risk of damage of herbicide in protected environments due to a). absorption b). leaching c). runoff d). volatilization

Last Answer : d). volatilization

Description : Which one among the following statements is not correct? The word 'socialist' in the Preamble of the Constitution of India read with - (1) Article 39 (d), would enable the court to uphold the ... under that Article (4) Article 23, would enable the court to reduce inequality in income and status

Last Answer : (4) Article 23, would enable the court to reduce inequality in income and status. Explanation: Traffic in human beings and beggars and other similar forms of forced labour are prohibited and any ... . Thus, the word Socialist in the preamble of the Constitution of India read with Article 23.

Description : The main idea of Bidirectional search is to reduce the time complexity by searching two way simultaneously from start node and another from goal node. a) True b) False

Last Answer : a) True

Description : The principal cause of soil damage in Punjab and Haryana is (a) Deforestation (b) Soil erosion (c) Excessive cultivation (d) Salinity and water logging

Last Answer : Ans: (d)

Description : Which of the following indicates the types of soil erosion in decreasing order of damage caused In India (a) Ravine erosion .and gullies, alkalinity and salinity weeds and water-logging (b) Alkalinity ... and weeds (c) Water-logging, weeds, salinity and ravine erosion (d) All are equally damaging

Last Answer : Ans: (a)

Description : How do the western disturbances affect the crops in north India? (a) They cause heavy damage to the standing crops (b) They bring in locusts which destroy the crops (c) They are beneficial to the crops by causing winter rain (d) They help in keeping the plants warm to some extent in winter

Last Answer : Ans: (c)