CSS244



Category: CSS244

0

CSS244

1 / 70

1.

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

2 / 70

2.

History has shown that the
first public virus removal
task was performed
in________

3 / 70

3.

The deliberate act of
destroying another person's
property by fire is

4 / 70

4.

The qualitative risk analysis
is the effort to determine
the ______probability

5 / 70

5.

s a method through which
we analyse crime

6 / 70

6.

The quality of the decision
we make after our
automated analysis largely
determine the amount of
success we record in the
course of our

7 / 70

7.

Security threat can be
described as a capacity to
destroy the vital interests of
other considered as

8 / 70

8.

is the process of analysing
data from different
perspectives and
summarising it into useful
information.

9 / 70

9.

is a subfield in criminology
and security studies

10 / 70

10.

The end of the cold war in
has widened the scope of
security studies

11 / 70

11.

The climatic change and
environment pollution in
Africa has increased
_________

12 / 70

12.

what is the measures used
to provide physical
protecton of resourses
against deliberate and
accidental threats_______

13 / 70

13.

Terrorism is a ______
threat

14 / 70

14.

On food security,about -of
urban dwellers go about
with empty
stomach_______

15 / 70

15.

A threat that takes place on
the road, streets, or even
bridges is

16 / 70

16.

Element of preparedness in
civil security approaches
includes________

17 / 70

17.

Authentication is a
technique in which we
create___________

18 / 70

18.

The factors chiefly
responsible for various
environmental pollutions
are

19 / 70

19.

An effective public warnings
in responding to disaster
reduces _______

20 / 70

20.

1. According to ______the
State is the custodian and
ultimate beneficiary of the
monopoly use of violence

21 / 70

21.

The capacity of any human
and non-human elements
to destroy the vital interests
of others considered as
targets is _____

22 / 70

22.

Another name for
Knowledge Discovery in
Database (KDD) is

23 / 70

23.

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

24 / 70

24.

the geological security
threat is an aspect of

25 / 70

25.

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

26 / 70

26.

s an essential tool of crime
analysis

27 / 70

27.

security threat is classified
into_______ divisions

28 / 70

28.

who defines security threat
as development that
threaten the sovereignty of
the state________

29 / 70

29.

In Nigeria, where the
number of police personnel
is very inadequate to
provide any meaningful
security calls for

30 / 70

30.

According to ______ civil
security includes a better
interdepartmental
coordination

31 / 70

31.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

32 / 70

32.

Adamsite (DM) is a
chemical agent used as

33 / 70

33.

The mild application of
intimidation and violence to
bus passengers by criminal
gangs is known as

34 / 70

34.

the use of poisonous gases
on any targeted persons
and ecosystem is

35 / 70

35.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

36 / 70

36.

is the tool to probe further
as a search light to what
may constitute an act of
criminality

37 / 70

37.

This is one of the forms of
terrorism________

38 / 70

38.

When contaminations
cannot be processed and
neutralised by environment
we experienced _______
pollution

39 / 70

39.

A criminal act that relate to
illegal acquisition of another
person's property is called

40 / 70

40.

Another name for
demonstration is

41 / 70

41.

During the Westphalia
period, the major threat to
the political sovereignty of
any State usually emanated
from ____State

42 / 70

42.

defined terrorism as the
theory behind the method
whereby an organised
group seeks to achieve its
avowed aims through the
use of violence

43 / 70

43.

Traditionally, assassination
was synonymous to covet
sanctioned killing of any
person.

44 / 70

44.

Terrorism is coined from the
word_____

45 / 70

45.

Basically, any intentional
and unintentional criminal
actions are 

46 / 70

46.

A hurricane is a type of
tropical ____________

47 / 70

47.

The threat which includes
flood and cyclone is

48 / 70

48.

Etymologically,the word
"tsunami" emanate from
the______ language

49 / 70

49.

The threat which involve
the malicious activities of
man is known as

50 / 70

50.

what involves safety
against HIV-AIDS
pandemicsis__________

51 / 70

51.

Piracy in the 17th and 18th
centuries attracted
penalty against the
offenders

52 / 70

52.

The
threats include
earthquakes, volcanic
eruptions, tsunamis (tidal
waves) and landslides

53 / 70

53.

The type of robbery been
phenomenal in South
Africa, U.S.A, Sweden and
Nigeria is

54 / 70

54.

The factors responsible for
the various pollutions that
generate environmental
hazards is________

55 / 70

55.

Etymologically, the word
Assassin emanated from
the Arabic word

56 / 70

56.

The terrorist attacks into the
world trade center was
linked to_________

57 / 70

57.

Before the advent of
internet ,computer virus
were usually spread
through __________

58 / 70

58.

The period in which threat
to security usually involved
state to state aggression is

59 / 70

59.

In physical security,-is
installed for surveillance
and notification_________

60 / 70

60.

Due to the Revolution in
modern technology some
computers demandinformation before an
access is______

61 / 70

61.

Another name for
earthquake
is____________

62 / 70

62.

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

63 / 70

63.

The word terrorism was
popularised by the jacobins
who ruled____________

64 / 70

64.

is very helpful to unravel
secrets in organised crimes
like terrorism,
assassination, armed
robbery and electoral
practices.

65 / 70

65.

One of the effects of
Environmental pollution is
________

66 / 70

66.

involves conducting our
investigation by moving
from unknown to known

67 / 70

67.

Piracy usually involves a
very violent act perpetrated
by private parties of no
affiliation

68 / 70

68.

The process of wrongfully
labelling an innocent
person as a criminal due to
mistakes is the result of our
automated data analysis is
called

69 / 70

69.

One great obstacle to the
use of most of the warning
facilities is the erratic nature
of ________in Nigeria

70 / 70

70.

It is a fact that food security
is not luxury but_______

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link