CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

Traditionally, the state is the
custodian and ultimate
beneficiary of the monopoly
use of violence as
advocated by

2 / 50

2.

The internal or external
threat that challenges the
authority of the state is
_________

3 / 50

3.

One of the basic manmade
security threats is _____

4 / 50

4.

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

5 / 50

5.

A hurricane is a type of
tropical ____________

6 / 50

6.

The civil security which has
adequate knowledge of
incidence of risk through
the process of risk
education is ______

7 / 50

7.

Piracy is a violent crime
and robbery which takes
place on the

8 / 50

8.

Due to the Revolution in
modern technology some
computers demandinformation before an
access is______

9 / 50

9.

In Nigeria, where the
number of police personnel
is very inadequate to
provide any meaningful
security calls for

10 / 50

10.

Security threat can be
described as a capacity to
destroy the vital interests of
other considered as

11 / 50

11.

One of themajor
environmental threats is
___________

12 / 50

12.

helps us in our analysis of
data to have more
information about the
subject and gives a clearer
picture of the subject.

13 / 50

13.

The process of wrongfully
labelling an innocent
person as a criminal due to
mistakes is the result of our
automated data analysis is
called

14 / 50

14.

defined terrorism as the
theory behind the method
whereby an organised
group seeks to achieve its
avowed aims through the
use of violence

15 / 50

15.

The activities of disloyal
employees can affect the
collapse of any
if adequate mitigation
measures are not taken

16 / 50

16.

The quality of the decision
we make after our
automated analysis largely
determine the amount of
success we record in the
course of our

17 / 50

17.

is the tool to probe further
as a search light to what
may constitute an act of
criminality

18 / 50

18.

Before the advent of
internet ,computer virus
were usually spread
through __________

19 / 50

19.

climatic hazards are
created by factors such as
_________

20 / 50

20.

With the experience from
the september 11 terrorist
attck in the USA, most
countries have fortified their
airports with______

21 / 50

21.

what involves safety
against HIV-AIDS
pandemicsis__________

22 / 50

22.

The threat which involve
the malicious activities of
man is known as

23 / 50

23.

The type of robbery been
phenomenal in South
Africa, U.S.A, Sweden and
Nigeria is

24 / 50

24.

Terrorism is a ______
threat

25 / 50

25.

The type of demonstration
that can lead to the
breakdown of law and order
is

26 / 50

26.

Etymologically,the word
"tsunami" emanate from
the______ language

27 / 50

27.

security threat is classified
into_______ divisions

28 / 50

28.

The factors responsible for
the various pollutions that
generate environmental
hazards is________

29 / 50

29.

enables security
practitioners to put
observable crime data to
scientific testing through the
processes of data collation,
analysis and interpretation

30 / 50

30.

Authentication is a
technique in which we
create___________

31 / 50

31.

Infrastucture security is
designed to provide
protection for critical
infrastructures such as
__________

32 / 50

32.

Hurricane is an example
of_____threat

33 / 50

33.

Terrorism is coined from the
word_____

34 / 50

34.

is very helpful to unravel
secrets in organised crimes
like terrorism,
assassination, armed
robbery and electoral
practices.

35 / 50

35.

Link analysis is very
popular among
practitioners

36 / 50

36.

Piracy in the 17th and 18th
centuries attracted
penalty against the
offenders

37 / 50

37.

The process through which
we use computer to
develop a large database is
known as

38 / 50

38.

Terrorism is a ferocious use
of violence, a form of

39 / 50

39.

An effective public warnings
in responding to disaster
reduces _______

40 / 50

40.

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

41 / 50

41.

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

42 / 50

42.

The introduction of
system has really impacted
positively on the task of
data mining

43 / 50

43.

The terrorist attacks into the
world trade center was
linked to_________

44 / 50

44.

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

45 / 50

45.

These tools above are
effective tools for
applications in crime
prevention and

46 / 50

46.

A criminal act that relate to
illegal acquisition of another
person's property is called

47 / 50

47.

The first phase to the
incidence of hurricane
is_____________

48 / 50

48.

The leading factor to the
problem of climatic change
is the emission of _______
into the atmosphere

49 / 50

49.

One great obstacle to the
use of most of the warning
facilities is the erratic nature
of ________in Nigeria

50 / 50

50. The Italian word for workto-rule strike is

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link