CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

In physical security,-is
installed for surveillance
and notification_________

2 / 50

2.

s the direct application that
comes form considering the
inherent geography in crime

3 / 50

3.

Before the advent of
internet ,computer virus
were usually spread
through __________

4 / 50

4.

Preparedness is the key
element of civil security
which has the view
to_____violence

5 / 50

5.

One of the effects of
Environmental pollution is
________

6 / 50

6.

The threat which involve
the malicious activities of
man is known as

7 / 50

7.

what is the measures used
to provide physical
protecton of resourses
against deliberate and
accidental threats_______

8 / 50

8.

Chloroacetophenone (CN)
is a chemical agent used
for

9 / 50

9.

The transportation of a
woman against her will for
ransom is labelled

10 / 50

10.

The capacity of any human
and non-human elements
to destroy the vital interests
of others considered as
targets is _____

11 / 50

11.

In Lagos, Akala street in
Mushin, Ajegunle,
Okokomaiko, Iba, IjoraBadia are examples of
in criminal locations

12 / 50

12.

security threat is classified
into_______ divisions

13 / 50

13.

If there is no provision of
sufficient security at the
seaport,this causes
_______in that country

14 / 50

14.

The
threats include hurricane,
earthquake, drought and
flood.

15 / 50

15.

The end of the Cold War in
____ has widened the
scope of security

16 / 50

16.

Etymologically,the word
"tsunami" emanate from
the______ language

17 / 50

17.

The word terrorism was
popularised by the jacobins
who ruled____________

18 / 50

18.

A hurricane is a type of
tropical ____________

19 / 50

19.

The act of having an
understanding of crime
distribution and information
about the demography is
known as

20 / 50

20.

The measures that ensure
every individual entitlement
to employment and living
wage is_________

21 / 50

21.

Terrorism is coined from the
word_____

22 / 50

22.

One of the basic manmade
security threats is _____

23 / 50

23.

climatic hazards are
created by factors such as
_________

24 / 50

24.

The continual activites that
make protection of
mechanisms in information
security is _______

25 / 50

25.

Piracy usually involves a
very violent act perpetrated
by private parties of no
affiliation

26 / 50

26.

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

27 / 50

27.

Another name for
earthquake
is____________

28 / 50

28.

Another name for sick-out
strike is

29 / 50

29.

computer security is
described as an aspectof
_____security

30 / 50

30.

This is one of the forms of
terrorism________

31 / 50

31.

The mild application of
intimidation and violence to
bus passengers by criminal
gangs is known as

32 / 50

32.

An effective public warnings
in responding to disaster
reduces _______

33 / 50

33.

The leading factor to the
problem of climatic change
is the emission of _______
into the atmosphere

34 / 50

34.

helps us in our analysis of
data to have more
information about the
subject and gives a clearer
picture of the subject.

35 / 50

35.

the use of poisonous gases
on any targeted persons
and ecosystem is

36 / 50

36.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

37 / 50

37.

the geological security
threat is an aspect of

38 / 50

38.

0ne of the two issues that
determine the existence of
risk is the _______

39 / 50

39.

Terrorism is a ______
threat

40 / 50

40.

computer security provides
a platform which enhance
quality attributes like_____

41 / 50

41.

Another name for
Knowledge Discovery in
Database (KDD) is

42 / 50

42.

Etymologically, the word
Assassin emanated from
the Arabic word

43 / 50

43.

The type of demonstration
that can lead to the
breakdown of law and order
is

44 / 50

44.

who defines terrorism as a
method whereby an
organised groups seeks to
achieve its avowed aims
through
violence__________

45 / 50

45.

In Engineering , risk is
defined as the pobabilityof
an accident times
______per accident

46 / 50

46.

1. According to ______the
State is the custodian and
ultimate beneficiary of the
monopoly use of violence

47 / 50

47.

A criminal offence which
occurs when a person
unlawfully obtains services
from a person is

48 / 50

48.

Security threat can be
described as a capacity to
destroy the vital interests of
other considered as

49 / 50

49.

Due to the Revolution in
modern technology some
computers demandinformation before an
access is______

50 / 50

50.

One vital element of the
subject based query is

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link