CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

is very useful to assist
crime analysis to locate the
hot spots or locations
where particular crimes
often take place.

2 / 50

2.

The transportation of a
woman against her will for
ransom is labelled

3 / 50

3.

Violent criminal behaviors
designed primarily to
generate fear in the
community for political
purposes is

4 / 50

4.

Seaports are major
shipping places that are
vulnerable to security
_________

5 / 50

5.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

6 / 50

6.

is a subfield in criminology
and security studies

7 / 50

7.

climatic hazards are
created by factors such as
_________

8 / 50

8.

On food security,about -of
urban dwellers go about
with empty
stomach_______

9 / 50

9.

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

10 / 50

10.

Piracy usually involves a
very violent act perpetrated
by private parties of no
affiliation

11 / 50

11.

The word terrorism was
popularised by the jacobins
who ruled____________

12 / 50

12.

what involves safety
against HIV-AIDS
pandemicsis__________

13 / 50

13.

Link analysis is very
popular among
practitioners

14 / 50

14.

The climatic change and
environment pollution in
Africa has increased
_________

15 / 50

15.

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

16 / 50

16.

defined terrorism as the
theory behind the method
whereby an organised
group seeks to achieve its
avowed aims through the
use of violence

17 / 50

17.

This is one of the forms of
terrorism________

18 / 50

18.

A criminal act that relate to
illegal acquisition of another
person's property is called

19 / 50

19.

If there is no provision of
sufficient security at the
seaport,this causes
_______in that country

20 / 50

20.

The end of the cold war in
has widened the scope of
security studies

21 / 50

21.

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

22 / 50

22.

Terrorism is a ferocious use
of violence, a form of

23 / 50

23.

An effective public warnings
in responding to disaster
reduces _______

24 / 50

24.

The factors responsible for
the various pollutions that
generate environmental
hazards is________

25 / 50

25.

During the Westphalia
period, the major threat to
the political sovereignty of
any State usually emanated
from ____State

26 / 50

26.

When contaminations
cannot be processed and
neutralised by environment
we experienced _______
pollution

27 / 50

27.

Among the
Greeks,earthquake is said
to be caused
by____________

28 / 50

28.

computer security is
described as an aspectof
_____security

29 / 50

29.

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

30 / 50

30.

0ne type of the anti-virus
softwares in the market
today is_______

31 / 50

31.

The process through which
we use computer to
develop a large database is
known as

32 / 50

32.

Adamsite (DM) is a
chemical agent used as

33 / 50

33.

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

34 / 50

34.

The type of demonstration
that can lead to the
breakdown of law and order
is

35 / 50

35.

Basically, any intentional
and unintentional criminal
actions are 

36 / 50

36.

The internal or external
threat that challenges the
authority of the state is
_________

37 / 50

37.

Before the advent of
internet ,computer virus
were usually spread
through __________

38 / 50

38.

The first phase to the
incidence of hurricane
is_____________

39 / 50

39.

The transportation of a
person against the person's
will, usually to hold the
person with illegal authority
for ransom is

40 / 50

40.

The mild application of
intimidation and violence to
bus passengers by criminal
gangs is known as

41 / 50

41.

Insurgency is a form of
security threat

42 / 50

42.

History has shown that the
first public virus removal
task was performed
in________

43 / 50

43.

Rapid rate of
industrialisation is one of
the factors responsible for
the problem of
___________in
communities

44 / 50

44.

Chloroacetophenone (CN)
is a chemical agent used
for

45 / 50

45.

who defines security threat
as development that
threaten the sovereignty of
the state________

46 / 50

46.

Security threat can be
described as a capacity to
destroy the vital interests of
other considered as

47 / 50

47.

Authentication is a
technique in which we
create___________

48 / 50

48.

The
threats include
earthquakes, volcanic
eruptions, tsunamis (tidal
waves) and landslides

49 / 50

49.

Another name for
demonstration is

50 / 50

50.

In international airports ,it is
illegal for restaurant
operators to use plates
which terrorists may
convert to______

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link