ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
Traditionally, the state is the custodian and ultimate beneficiary of the monopoly use of violence as advocated by
2 / 50
The internal or external threat that challenges the authority of the state is _________
3 / 50
One of the basic manmade security threats is _____
4 / 50
Hydrogen cyanide (AC) is a chemical agent that acts on the
5 / 50
A hurricane is a type of tropical ____________
6 / 50
The civil security which has adequate knowledge of incidence of risk through the process of risk education is ______
7 / 50
Piracy is a violent crime and robbery which takes place on the
8 / 50
Due to the Revolution in modern technology some computers demandinformation before an access is______
9 / 50
In Nigeria, where the number of police personnel is very inadequate to provide any meaningful security calls for
10 / 50
Security threat can be described as a capacity to destroy the vital interests of other considered as
11 / 50
One of themajor environmental threats is ___________
12 / 50
helps us in our analysis of data to have more information about the subject and gives a clearer picture of the subject.
13 / 50
The process of wrongfully labelling an innocent person as a criminal due to mistakes is the result of our automated data analysis is called
14 / 50
defined terrorism as the theory behind the method whereby an organised group seeks to achieve its avowed aims through the use of violence
15 / 50
The activities of disloyal employees can affect the collapse of any if adequate mitigation measures are not taken
16 / 50
The quality of the decision we make after our automated analysis largely determine the amount of success we record in the course of our
17 / 50
is the tool to probe further as a search light to what may constitute an act of criminality
18 / 50
Before the advent of internet ,computer virus were usually spread through __________
19 / 50
climatic hazards are created by factors such as _________
20 / 50
With the experience from the september 11 terrorist attck in the USA, most countries have fortified their airports with______
21 / 50
what involves safety against HIV-AIDS pandemicsis__________
22 / 50
The threat which involve the malicious activities of man is known as
23 / 50
The type of robbery been phenomenal in South Africa, U.S.A, Sweden and Nigeria is
24 / 50
Terrorism is a ______ threat
25 / 50
The type of demonstration that can lead to the breakdown of law and order is
26 / 50
Etymologically,the word "tsunami" emanate from the______ language
27 / 50
security threat is classified into_______ divisions
28 / 50
The factors responsible for the various pollutions that generate environmental hazards is________
29 / 50
enables security practitioners to put observable crime data to scientific testing through the processes of data collation, analysis and interpretation
30 / 50
Authentication is a technique in which we create___________
31 / 50
Infrastucture security is designed to provide protection for critical infrastructures such as __________
32 / 50
Hurricane is an example of_____threat
33 / 50
Terrorism is coined from the word_____
34 / 50
is very helpful to unravel secrets in organised crimes like terrorism, assassination, armed robbery and electoral practices.
35 / 50
Link analysis is very popular among practitioners
36 / 50
Piracy in the 17th and 18th centuries attracted penalty against the offenders
37 / 50
The process through which we use computer to develop a large database is known as
38 / 50
Terrorism is a ferocious use of violence, a form of
39 / 50
An effective public warnings in responding to disaster reduces _______
40 / 50
A threat which often involves the use of instruments of intimidation and coercion by a party(ies) against another party is
41 / 50
A law enforcement function that involves a systematic analysis for identifying and analysing patterns and trends in crime and disorder is called
42 / 50
The introduction of system has really impacted positively on the task of data mining
43 / 50
The terrorist attacks into the world trade center was linked to_________
44 / 50
who said that enemies may hide destructive objects in containers which they later use against a country _________
45 / 50
These tools above are effective tools for applications in crime prevention and
46 / 50
A criminal act that relate to illegal acquisition of another person's property is called
47 / 50
The first phase to the incidence of hurricane is_____________
48 / 50
The leading factor to the problem of climatic change is the emission of _______ into the atmosphere
49 / 50
One great obstacle to the use of most of the warning facilities is the erratic nature of ________in Nigeria
50 / 50
50. The Italian word for workto-rule strike is
Restart quiz
Rate this quiz