ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
is very useful to assist crime analysis to locate the hot spots or locations where particular crimes often take place.
2 / 50
The transportation of a woman against her will for ransom is labelled
3 / 50
Violent criminal behaviors designed primarily to generate fear in the community for political purposes is
4 / 50
Seaports are major shipping places that are vulnerable to security _________
5 / 50
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
6 / 50
is a subfield in criminology and security studies
7 / 50
climatic hazards are created by factors such as _________
8 / 50
On food security,about -of urban dwellers go about with empty stomach_______
9 / 50
The liquid or solid that has very toxic effects on any targeted persons and ecosystem is_______
10 / 50
Piracy usually involves a very violent act perpetrated by private parties of no affiliation
11 / 50
The word terrorism was popularised by the jacobins who ruled____________
12 / 50
what involves safety against HIV-AIDS pandemicsis__________
13 / 50
Link analysis is very popular among practitioners
14 / 50
The climatic change and environment pollution in Africa has increased _________
15 / 50
Hydrogen cyanide (AC) is a chemical agent that acts on the
16 / 50
defined terrorism as the theory behind the method whereby an organised group seeks to achieve its avowed aims through the use of violence
17 / 50
This is one of the forms of terrorism________
18 / 50
A criminal act that relate to illegal acquisition of another person's property is called
19 / 50
If there is no provision of sufficient security at the seaport,this causes _______in that country
20 / 50
The end of the cold war in has widened the scope of security studies
21 / 50
The ________ threats include armed robbery, assassination, computer intrusion, information hacking and corruption.
22 / 50
Terrorism is a ferocious use of violence, a form of
23 / 50
An effective public warnings in responding to disaster reduces _______
24 / 50
The factors responsible for the various pollutions that generate environmental hazards is________
25 / 50
During the Westphalia period, the major threat to the political sovereignty of any State usually emanated from ____State
26 / 50
When contaminations cannot be processed and neutralised by environment we experienced _______ pollution
27 / 50
Among the Greeks,earthquake is said to be caused by____________
28 / 50
computer security is described as an aspectof _____security
29 / 50
who said that enemies may hide destructive objects in containers which they later use against a country _________
30 / 50
0ne type of the anti-virus softwares in the market today is_______
31 / 50
The process through which we use computer to develop a large database is known as
32 / 50
Adamsite (DM) is a chemical agent used as
33 / 50
A law enforcement function that involves a systematic analysis for identifying and analysing patterns and trends in crime and disorder is called
34 / 50
The type of demonstration that can lead to the breakdown of law and order is
35 / 50
Basically, any intentional and unintentional criminal actions are
36 / 50
The internal or external threat that challenges the authority of the state is _________
37 / 50
Before the advent of internet ,computer virus were usually spread through __________
38 / 50
The first phase to the incidence of hurricane is_____________
39 / 50
The transportation of a person against the person's will, usually to hold the person with illegal authority for ransom is
40 / 50
The mild application of intimidation and violence to bus passengers by criminal gangs is known as
41 / 50
Insurgency is a form of security threat
42 / 50
History has shown that the first public virus removal task was performed in________
43 / 50
Rapid rate of industrialisation is one of the factors responsible for the problem of ___________in communities
44 / 50
Chloroacetophenone (CN) is a chemical agent used for
45 / 50
who defines security threat as development that threaten the sovereignty of the state________
46 / 50
Security threat can be described as a capacity to destroy the vital interests of other considered as
47 / 50
Authentication is a technique in which we create___________
48 / 50
The threats include earthquakes, volcanic eruptions, tsunamis (tidal waves) and landslides
49 / 50
Another name for demonstration is
50 / 50
In international airports ,it is illegal for restaurant operators to use plates which terrorists may convert to______
Restart quiz
Rate this quiz