CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

defined terrorism as the
theory behind the method
whereby an organised
group seeks to achieve its
avowed aims through the
use of violence

2 / 50

2.

The terrorist attacks into the
world trade center was
linked to_________

3 / 50

3.

Adamsite (DM) is a
chemical agent used as

4 / 50

4.

what involves safety
against HIV-AIDS
pandemicsis__________

5 / 50

5.

One of themajor
environmental threats is
___________

6 / 50

6.

is the tool to probe further
as a search light to what
may constitute an act of
criminality

7 / 50

7.

is often applied at various
levels of law enforcement in
any community to know the
situations of crime and
ways to reduce it

8 / 50

8.

Piracy usually involves a
very violent act perpetrated
by private parties of no
affiliation

9 / 50

9.

A threat where the
offenders use deadly
weapons in the course of
carrying out their dastardly
act is called

10 / 50

10.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

11 / 50

11.

Violent criminal behaviors
designed primarily to
generate fear in the
community for political
purposes is

12 / 50

12.

The capacity of any human
and non-human elements
to destroy the vital interests
of others considered as
targets is _____

13 / 50

13.

The process through which
we use computer to
develop a large database is
known as

14 / 50

14.

The end of the Cold War in
____ has widened the
scope of security

15 / 50

15.

The continual activites that
make protection of
mechanisms in information
security is _______

16 / 50

16.

The threat which includes
flood and cyclone is

17 / 50

17.

The transportation of a
woman against her will for
ransom is labelled

18 / 50

18.

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

19 / 50

19.

0ne type of the anti-virus
softwares in the market
today is_______

20 / 50

20.

In Nigeria, where the
number of police personnel
is very inadequate to
provide any meaningful
security calls for

21 / 50

21.

In international airports ,it is
illegal for restaurant
operators to use plates
which terrorists may
convert to______

22 / 50

22.

The
threats include hurricane,
earthquake, drought and
flood.

23 / 50

23.

The use of crime mapping
through installation of
security gadgets like
CCTV's and secret
camera's are helpful to
identify

24 / 50

24.

The measures that ensure
every individual entitlement
to employment and living
wage is_________

25 / 50

25.

In physical security,-is
installed for surveillance
and notification_________

26 / 50

26.

One vital element of the
subject based query is

27 / 50

27.

Piracy in the 17th and 18th
centuries attracted
penalty against the
offenders

28 / 50

28.

Infrastucture security is
designed to provide
protection for critical
infrastructures such as
__________

29 / 50

29.

Another name for
demonstration is

30 / 50

30.

Rapid rate of
industrialisation is one of
the factors responsible for
the problem of
___________in
communities

31 / 50

31.

An effective public warnings
in responding to disaster
reduces _______

32 / 50

32.

These tools above are
effective tools for
applications in crime
prevention and

33 / 50

33.

Insurgency is a form of
security threat

34 / 50

34.

The threat which usually
attract crowds with strong
emotional convictions to act
in unlawful ways is called

35 / 50

35.

The measures and actions
taken by a company to
protects its corporate image
and establish regulations
is_______

36 / 50

36.

The leading factor to the
problem of climatic change
is the emission of _______
into the atmosphere

37 / 50

37.

Due to the Revolution in
modern technology some
computers demandinformation before an
access is______

38 / 50

38.

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

39 / 50

39.

s a method through which
we analyse crime

40 / 50

40.

A hurricane is a type of
tropical ____________

41 / 50

41.

The civil security which has
adequate knowledge of
incidence of risk through
the process of risk
education is ______

42 / 50

42.

Another name for
earthquake
is____________

43 / 50

43.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

44 / 50

44.

During these periods in
pirates caught were
paraded before the public
and later subject to
execution.

45 / 50

45.

According to ______ civil
security includes a better
interdepartmental
coordination

46 / 50

46.

The progressive destruction
and less capable of
sustaining vegetation
is_________

47 / 50

47.

The internal or external
threat that challenges the
authority of the state is
_________

48 / 50

48.

In Lagos, Akala street in
Mushin, Ajegunle,
Okokomaiko, Iba, IjoraBadia are examples of
in criminal locations

49 / 50

49.

Traditionally, assassination
was synonymous to covet
sanctioned killing of any
person.

50 / 50

50.

Element of preparedness in
civil security approaches
includes________

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link