CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

what involves safety
against HIV-AIDS
pandemicsis__________

2 / 50

2.

The emergence of the cold
war started in the yea

3 / 50

3.

is the tool to probe further
as a search light to what
may constitute an act of
criminality

4 / 50

4.

Climatic hazards basically
include hurricane, flood and

5 / 50

5.

the geological security
threat is an aspect of

6 / 50

6.

who defines terrorism as a
method whereby an
organised groups seeks to
achieve its avowed aims
through
violence__________

7 / 50

7.

The act of having an
understanding of crime
distribution and information
about the demography is
known as

8 / 50

8.

This is one of the forms of
terrorism________

9 / 50

9.

Thunderstorm is an
example________threat

10 / 50

10.

The period in which threat
to security usually involved
state to state aggression is

11 / 50

11.

The climatic change and
environment pollution in
Africa has increased
_________

12 / 50

12.

Tsunami is usually mounted
by some geological
conditions like_______

13 / 50

13.

The end of the Cold War in
____ has widened the
scope of security

14 / 50

14.

The internal or external
threat that challenges the
authority of the state is
_________

15 / 50

15.

The type of robbery been
phenomenal in South
Africa, U.S.A, Sweden and
Nigeria is

16 / 50

16.

On food security,about -of
urban dwellers go about
with empty
stomach_______

17 / 50

17.

computer security is
described as an aspectof
_____security

18 / 50

18.

Chloroacetophenone (CN)
is a chemical agent used
for

19 / 50

19.

s an essential tool of crime
analysis

20 / 50

20.

is the process of analysing
data from different
perspectives and
summarising it into useful
information.

21 / 50

21.

One of the effects of
Environmental pollution is
________

22 / 50

22.

In international airports ,it is
illegal for restaurant
operators to use plates
which terrorists may
convert to______

23 / 50

23.

Another name for
demonstration is

24 / 50

24.

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

25 / 50

25.

The use of crime mapping
through installation of
security gadgets like
CCTV's and secret
camera's are helpful to
identify

26 / 50

26.

The quantitative risk
analysis is the effort to
determine
the____probability

27 / 50

27.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

28 / 50

28.

The transportation of a
woman against her will for
ransom is labelled

29 / 50

29.

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

30 / 50

30.

Terrorism is a ______
threat

31 / 50

31.

The anti-colonial armed
struggle between the
imperial forces of portugal
and
mozambique[FRELIMO]
was in _______

32 / 50

32.

With the experience from
the september 11 terrorist
attck in the USA, most
countries have fortified their
airports with______

33 / 50

33.

The process of wrongfully
labelling an innocent
person as a criminal due to
mistakes is the result of our
automated data analysis is
called

34 / 50

34.

When contaminations
cannot be processed and
neutralised by environment
we experienced _______
pollution

35 / 50

35.

Before the advent of
internet ,computer virus
were usually spread
through __________

36 / 50

36.

The quality of the decision
we make after our
automated analysis largely
determine the amount of
success we record in the
course of our

37 / 50

37.

Adamsite (DM) is a
chemical agent used as

38 / 50

38.

Etymologically, the word
Assassin emanated from
the Arabic word

39 / 50

39.

s a method through which
we analyse crime

40 / 50

40.

the use of poisonous gases
on any targeted persons
and ecosystem is

41 / 50

41.

Rapid rate of
industrialisation is one of
the factors responsible for
the problem of
___________in
communities

42 / 50

42.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

43 / 50

43.

Violent criminal behaviors
designed primarily to
generate fear in the
community for political
purposes is

44 / 50

44.

0ne of the two issues that
determine the existence of
risk is the _______

45 / 50

45.

The central focus of
computer security is the
techniques that enhance
the correct________

46 / 50

46.

One of the basic manmade
security threats is _____

47 / 50

47.

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

48 / 50

48.

The measures and actions
taken by a company to
protects its corporate image
and establish regulations
is_______

49 / 50

49.

computer security provides
a platform which enhance
quality attributes like_____

50 / 50

50.

is often applied at various
levels of law enforcement in
any community to know the
situations of crime and
ways to reduce it

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link