CSS246



Category: CSS246

0

CSS246

1 / 70

1.

The descriptive term which implies triming
of small amount of money from many
sources and diverting these slices into
one's own or accomplice's acount is called
___________

2 / 70

2.

__generally
refers to the security departments that exist
within businesses or corporations

3 / 70

3.

One of the basic criteria for obtaining
license to perform private guarding
activities is

4 / 70

4.

Is the process
of distributing authority throughout an
organization.

5 / 70

5.

PI Kits Includes DVR Kits,
_____________and, Sunglass Kits,

6 / 70

6.

The Nigeria Security Civil Defence Corps is
headed by the _____________

7 / 70

7.

One of the reasons for the growth
eperienced in the private security sector in
recent times is _____________

8 / 70

8.

Example of critical infrastructure include
___________

9 / 70

9.

Intrapersonal conflict leads
to_____________performance

10 / 70

10.

Is a state of
disagreement over a particular issue or
group of issues over which there is conflict
between workers and employers

11 / 70

11.

Risk identification is to make the task of
risk analysis more _____________ By
establishing a base from which to proceed

12 / 70

12.

This trend has been followed in
_____________especially where the state
lack the technical know-how so far as
security matters are concerned.

13 / 70

13. Cetralization is the retention of decisionmaking authority by a

14 / 70

14.

The Nigeria security and civil defense
corps (NSCDC) was formally referred to as

15 / 70

15.

The regulation and licensing of PSC fall
under the jurisdiction of the ministry of

16 / 70

16.

___________is saddled with the
responsibility of managing and controlling
of information.

17 / 70

17.

Law enforcement use the private sector's
specialized knowledge and

18 / 70

18.

Private security officer is required to make
arrest

19 / 70

19.

Conflict arising from the need to manage
the interdependence between different
organizational sub-units is called
___________

20 / 70

20.

private security companies
_____________ Serve as sources of
intelligence gathering

21 / 70

21.

The type of conflict that is internal to an
individual and perharps the most difficult to
analyse and manage is called
_____________

22 / 70

22.

The type of conflict that arises in a dyadic
relationship is known as ____________

23 / 70

23.

Piracy takes
_specific and often confused forms

24 / 70

24.

List of other services that PSCs and PMCs
provide include

25 / 70

25. Spying is also referred to as

26 / 70

26.

The ways of managing organizational
conflict is called

27 / 70

27.

The private security sector is divided into
two categories; Private Military Companies
and

28 / 70

28.

The number of people who report to one
manager or supervisor is called

29 / 70

29.

Private Security Companies serve as an
additional _____________ Resource in the
fight against crime

30 / 70

30. One of the operationalization of riskmanagement alternatives include

31 / 70

31. Audio Equipment: Includes Analog and

32 / 70

32.

According to_____________, “Human
rights represent demands or claims which
individuals or group make on society, some
of which are protected by law, while others
remain aspirations to be attained in future.

33 / 70

33.

Is a crime
which is nonviolent but the end could be
violent

34 / 70

34.

Security personnel also perform
_____________ Control at the building
entrances and vehicle gates

35 / 70

35.

Two way radios are portable equipments
used mainly by security officers in the
course of their duty. This is used mostly
because it is

36 / 70

36.

Halogen security company limited was
incorporated in _____________

37 / 70

37.

Security officers are often trained to
perform arrest and control procedures, as
well as operate emergency equipments
e.t.c

38 / 70

38.

is the
retention of decision-making authority by a
high-level manager

39 / 70

39.

These specific and confused forms are
counterfeiting,
and bootlegging

40 / 70

40.

A critical on-site examination to ascertain
the present security status, identity deficits
or excess, determine the protection need
and make _________ recommendations to
immprove the overall security of the
operation

41 / 70

41.

Law enforcement can prepare private
security to assist in

42 / 70

42.

Private security companies operating
without licences and witout regard to
standard and basic security principles is
refered to as

43 / 70

43.

Advantages of the Private Security Industry
include the following except ___________

44 / 70

44. Spying involving corporation is known as

45 / 70

45.

and
_are
compulsory for security guards

46 / 70

46.

A second critieria for obtaining license to
perform private guarding activities is

47 / 70

47.

The basic guard training covers chapters
related to the basic legal framework,
security procedures, health
and_____________

48 / 70

48.

In Nigreia, the private guards act of 1986
prohibits privae security companies from

49 / 70

49.

The purpose of any private security
company or any private instijtution is first
and foremost the concern on how to
ensure

50 / 70

50.

As a general rule, specialization increases
workers productivity and ______________

51 / 70

51.

External threat to security resulting from
inetrnatiional hostilities and aggression that
characterized the cold war era has been
replaced with

52 / 70

52.

_______allows management to devise
standard procedures for subordinates to
follow

53 / 70

53.

CCTV is used for more security coverage
in place of ________________

54 / 70

54.

_____________is a company which, for
itself or under contract with
another,transports currency, securities,
valuables, jewellery, food stamps, or any
other item that requires secured and
insured delivery from one place to another
with armed personnel.

55 / 70

55.

As Stemming (1988) argues for the
commercial user of private security, any
policing strategy must be proven

56 / 70

56.

The framework of jobs and departments
that make up any organization must be
directed towards achieving the
organization's

57 / 70

57.

___________is reposible for the integrity of
the information disseminated throughout
the company system

58 / 70

58.

The computer program that replicate
themselves and harm the computer system
on a network without the knowledge of the
system is called

59 / 70

59.

A crucial element of security management
is coordinating the many
_____________Within and outside the firm
so that the organizationn runs smoothly

60 / 70

60. Private security can "force multiplier"

61 / 70

61.

Improvement in security requires changing
old perceptions and
targets.

62 / 70

62.

The recomendation of licensing of PSC
has to be made by

63 / 70

63.

According to Sutherland (1939) white collar
crime is defined as an offence committed
by a person of a respectability and high
social status in the course of his or her

64 / 70

64.

Conflcits arising from sets of prescribed
behaviour is called ___________

65 / 70

65.

Coordination is the bedrock of the
department

66 / 70

66.

Quality Circle' is a concept which
emphasises increase in

67 / 70

67.

Blasting and carrying away of the entire
safe are the methods most commonly used
by

68 / 70

68.

system is the
combination of property management and
contractual line services

69 / 70

69.

Sources of conflict in an organization is
divided into 3, these are structural conflict,
role conflict and ___________

70 / 70

70.

Act (Cap 367) of
Guides the
licensing, control and adminstration adn
prohibited activities offences and penalties
rregarding PGCs.

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link