CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

Piracy usually involves a
very violent act perpetrated
by private parties of no
affiliation

2 / 50

2.

Piracy is a violent crime
and robbery which takes
place on the

3 / 50

3.

s a method through which
we analyse crime

4 / 50

4.

The qualitative risk analysis
is the effort to determine
the ______probability

5 / 50

5.

The introduction of
system has really impacted
positively on the task of
data mining

6 / 50

6.

The climatic change and
environment pollution in
Africa has increased
_________

7 / 50

7.

Before the advent of
internet ,computer virus
were usually spread
through __________

8 / 50

8.

Chloroacetophenone (CN)
is a chemical agent used
for

9 / 50

9.

The transportation of a
woman against her will for
ransom is labelled

10 / 50

10.

is the tool to probe further
as a search light to what
may constitute an act of
criminality

11 / 50

11.

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

12 / 50

12.

Authentication is a
technique in which we
create___________

13 / 50

13.

Rapid rate of
industrialisation is one of
the factors responsible for
the problem of
___________in
communities

14 / 50

14.

This is one of the forms of
terrorism________

15 / 50

15.

One vital element of the
subject based query is

16 / 50

16.

is very helpful to unravel
secrets in organised crimes
like terrorism,
assassination, armed
robbery and electoral
practices.

17 / 50

17.

The leading factor to the
problem of climatic change
is the emission of _______
into the atmosphere

18 / 50

18.

Among the
Greeks,earthquake is said
to be caused
by____________

19 / 50

19.

A criminal offence which
occurs when a person
unlawfully obtains services
from a person is

20 / 50

20.

The internal or external
threat that challenges the
authority of the state is
_________

21 / 50

21.

The god of earthquake in
Greek mythology
is____________

22 / 50

22.

The first phase to the
incidence of hurricane
is_____________

23 / 50

23.

0ne type of the anti-virus
softwares in the market
today is_______

24 / 50

24.

The factors chiefly
responsible for various
environmental pollutions
are

25 / 50

25.

In physical security,-is
installed for surveillance
and notification_________

26 / 50

26.

Violent criminal behaviors
designed primarily to
generate fear in the
community for political
purposes is

27 / 50

27.

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

28 / 50

28.

Another name for
Knowledge Discovery in
Database (KDD) is

29 / 50

29.

On food security,about -of
urban dwellers go about
with empty
stomach_______

30 / 50

30.

The use of crime mapping
through installation of
security gadgets like
CCTV's and secret
camera's are helpful to
identify

31 / 50

31.

s the direct application that
comes form considering the
inherent geography in crime

32 / 50

32.

climatic hazards are
created by factors such as
_________

33 / 50

33.

Piracy in the 17th and 18th
centuries attracted
penalty against the
offenders

34 / 50

34.

When contaminations
cannot be processed and
neutralised by environment
we experienced _______
pollution

35 / 50

35.

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

36 / 50

36.

In Lagos, Akala street in
Mushin, Ajegunle,
Okokomaiko, Iba, IjoraBadia are examples of
in criminal locations

37 / 50

37.

A threat where the
offenders use deadly
weapons in the course of
carrying out their dastardly
act is called

38 / 50

38.

One of the basic manmade
security threats is _____

39 / 50

39.

One of themajor
environmental threats is
___________

40 / 50

40.

An organised rebellion is
aimed at over throwing a
constituted
through the use of
subversion and armed
conflict

41 / 50

41.

One great obstacle to the
use of most of the warning
facilities is the erratic nature
of ________in Nigeria

42 / 50

42.

the geological security
threat is an aspect of

43 / 50

43.

The mild application of
intimidation and violence to
bus passengers by criminal
gangs is known as

44 / 50

44.

is often applied at various
levels of law enforcement in
any community to know the
situations of crime and
ways to reduce it

45 / 50

45.

0ne of the two issues that
determine the existence of
risk is the _______

46 / 50

46.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

47 / 50

47.

The capacity of any human
and non-human elements
to destroy the vital interests
of others considered as
targets is _____

48 / 50

48.

s an essential tool of crime
analysis

49 / 50

49.

An effective public warnings
in responding to disaster
reduces _______

50 / 50

50.

The climatic forms of
security threats have
impact not only on man but
on _______

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link