CSS244
1 / 70
The liquid or solid that has very toxic effects on any targeted persons and ecosystem is_______
2 / 70
History has shown that the first public virus removal task was performed in________
3 / 70
The deliberate act of destroying another person's property by fire is
4 / 70
The qualitative risk analysis is the effort to determine the ______probability
5 / 70
s a method through which we analyse crime
6 / 70
The quality of the decision we make after our automated analysis largely determine the amount of success we record in the course of our
7 / 70
Security threat can be described as a capacity to destroy the vital interests of other considered as
8 / 70
is the process of analysing data from different perspectives and summarising it into useful information.
9 / 70
is a subfield in criminology and security studies
10 / 70
The end of the cold war in has widened the scope of security studies
11 / 70
The climatic change and environment pollution in Africa has increased _________
12 / 70
what is the measures used to provide physical protecton of resourses against deliberate and accidental threats_______
13 / 70
Terrorism is a ______ threat
14 / 70
On food security,about -of urban dwellers go about with empty stomach_______
15 / 70
A threat that takes place on the road, streets, or even bridges is
16 / 70
Element of preparedness in civil security approaches includes________
17 / 70
Authentication is a technique in which we create___________
18 / 70
The factors chiefly responsible for various environmental pollutions are
19 / 70
An effective public warnings in responding to disaster reduces _______
20 / 70
1. According to ______the State is the custodian and ultimate beneficiary of the monopoly use of violence
21 / 70
The capacity of any human and non-human elements to destroy the vital interests of others considered as targets is _____
22 / 70
Another name for Knowledge Discovery in Database (KDD) is
23 / 70
A threat which often involves the use of instruments of intimidation and coercion by a party(ies) against another party is
24 / 70
the geological security threat is an aspect of
25 / 70
who said that enemies may hide destructive objects in containers which they later use against a country _________
26 / 70
s an essential tool of crime analysis
27 / 70
security threat is classified into_______ divisions
28 / 70
who defines security threat as development that threaten the sovereignty of the state________
29 / 70
In Nigeria, where the number of police personnel is very inadequate to provide any meaningful security calls for
30 / 70
According to ______ civil security includes a better interdepartmental coordination
31 / 70
who said that a method by which awareness and understanding can be translated into action include a range of activities______
32 / 70
Adamsite (DM) is a chemical agent used as
33 / 70
The mild application of intimidation and violence to bus passengers by criminal gangs is known as
34 / 70
the use of poisonous gases on any targeted persons and ecosystem is
35 / 70
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
36 / 70
is the tool to probe further as a search light to what may constitute an act of criminality
37 / 70
This is one of the forms of terrorism________
38 / 70
When contaminations cannot be processed and neutralised by environment we experienced _______ pollution
39 / 70
A criminal act that relate to illegal acquisition of another person's property is called
40 / 70
Another name for demonstration is
41 / 70
During the Westphalia period, the major threat to the political sovereignty of any State usually emanated from ____State
42 / 70
defined terrorism as the theory behind the method whereby an organised group seeks to achieve its avowed aims through the use of violence
43 / 70
Traditionally, assassination was synonymous to covet sanctioned killing of any person.
44 / 70
Terrorism is coined from the word_____
45 / 70
Basically, any intentional and unintentional criminal actions are
46 / 70
A hurricane is a type of tropical ____________
47 / 70
The threat which includes flood and cyclone is
48 / 70
Etymologically,the word "tsunami" emanate from the______ language
49 / 70
The threat which involve the malicious activities of man is known as
50 / 70
what involves safety against HIV-AIDS pandemicsis__________
51 / 70
Piracy in the 17th and 18th centuries attracted penalty against the offenders
52 / 70
The threats include earthquakes, volcanic eruptions, tsunamis (tidal waves) and landslides
53 / 70
The type of robbery been phenomenal in South Africa, U.S.A, Sweden and Nigeria is
54 / 70
The factors responsible for the various pollutions that generate environmental hazards is________
55 / 70
Etymologically, the word Assassin emanated from the Arabic word
56 / 70
The terrorist attacks into the world trade center was linked to_________
57 / 70
Before the advent of internet ,computer virus were usually spread through __________
58 / 70
The period in which threat to security usually involved state to state aggression is
59 / 70
In physical security,-is installed for surveillance and notification_________
60 / 70
Due to the Revolution in modern technology some computers demandinformation before an access is______
61 / 70
Another name for earthquake is____________
62 / 70
A law enforcement function that involves a systematic analysis for identifying and analysing patterns and trends in crime and disorder is called
63 / 70
The word terrorism was popularised by the jacobins who ruled____________
64 / 70
is very helpful to unravel secrets in organised crimes like terrorism, assassination, armed robbery and electoral practices.
65 / 70
One of the effects of Environmental pollution is ________
66 / 70
involves conducting our investigation by moving from unknown to known
67 / 70
Piracy usually involves a very violent act perpetrated by private parties of no affiliation
68 / 70
The process of wrongfully labelling an innocent person as a criminal due to mistakes is the result of our automated data analysis is called
69 / 70
One great obstacle to the use of most of the warning facilities is the erratic nature of ________in Nigeria
70 / 70
It is a fact that food security is not luxury but_______
Restart quiz
Rate this quiz