ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
what involves safety against HIV-AIDS pandemicsis__________
2 / 50
The emergence of the cold war started in the yea
3 / 50
is the tool to probe further as a search light to what may constitute an act of criminality
4 / 50
Climatic hazards basically include hurricane, flood and
5 / 50
the geological security threat is an aspect of
6 / 50
who defines terrorism as a method whereby an organised groups seeks to achieve its avowed aims through violence__________
7 / 50
The act of having an understanding of crime distribution and information about the demography is known as
8 / 50
This is one of the forms of terrorism________
9 / 50
Thunderstorm is an example________threat
10 / 50
The period in which threat to security usually involved state to state aggression is
11 / 50
The climatic change and environment pollution in Africa has increased _________
12 / 50
Tsunami is usually mounted by some geological conditions like_______
13 / 50
The end of the Cold War in ____ has widened the scope of security
14 / 50
The internal or external threat that challenges the authority of the state is _________
15 / 50
The type of robbery been phenomenal in South Africa, U.S.A, Sweden and Nigeria is
16 / 50
On food security,about -of urban dwellers go about with empty stomach_______
17 / 50
computer security is described as an aspectof _____security
18 / 50
Chloroacetophenone (CN) is a chemical agent used for
19 / 50
s an essential tool of crime analysis
20 / 50
is the process of analysing data from different perspectives and summarising it into useful information.
21 / 50
One of the effects of Environmental pollution is ________
22 / 50
In international airports ,it is illegal for restaurant operators to use plates which terrorists may convert to______
23 / 50
Another name for demonstration is
24 / 50
The ________ threats include armed robbery, assassination, computer intrusion, information hacking and corruption.
25 / 50
The use of crime mapping through installation of security gadgets like CCTV's and secret camera's are helpful to identify
26 / 50
The quantitative risk analysis is the effort to determine the____probability
27 / 50
who said that a method by which awareness and understanding can be translated into action include a range of activities______
28 / 50
The transportation of a woman against her will for ransom is labelled
29 / 50
A law enforcement function that involves a systematic analysis for identifying and analysing patterns and trends in crime and disorder is called
30 / 50
Terrorism is a ______ threat
31 / 50
The anti-colonial armed struggle between the imperial forces of portugal and mozambique[FRELIMO] was in _______
32 / 50
With the experience from the september 11 terrorist attck in the USA, most countries have fortified their airports with______
33 / 50
The process of wrongfully labelling an innocent person as a criminal due to mistakes is the result of our automated data analysis is called
34 / 50
When contaminations cannot be processed and neutralised by environment we experienced _______ pollution
35 / 50
Before the advent of internet ,computer virus were usually spread through __________
36 / 50
The quality of the decision we make after our automated analysis largely determine the amount of success we record in the course of our
37 / 50
Adamsite (DM) is a chemical agent used as
38 / 50
Etymologically, the word Assassin emanated from the Arabic word
39 / 50
s a method through which we analyse crime
40 / 50
the use of poisonous gases on any targeted persons and ecosystem is
41 / 50
Rapid rate of industrialisation is one of the factors responsible for the problem of ___________in communities
42 / 50
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
43 / 50
Violent criminal behaviors designed primarily to generate fear in the community for political purposes is
44 / 50
0ne of the two issues that determine the existence of risk is the _______
45 / 50
The central focus of computer security is the techniques that enhance the correct________
46 / 50
One of the basic manmade security threats is _____
47 / 50
A threat which often involves the use of instruments of intimidation and coercion by a party(ies) against another party is
48 / 50
The measures and actions taken by a company to protects its corporate image and establish regulations is_______
49 / 50
computer security provides a platform which enhance quality attributes like_____
50 / 50
is often applied at various levels of law enforcement in any community to know the situations of crime and ways to reduce it
Restart quiz
Rate this quiz