CSS241



Category: CSS241

0

CSS241

1 / 70

1.

An earthquake can be said
to have__

2 / 70

2.

information warfare as
“struggles for control over
information activities”.

3 / 70

3.

The situation of domestic
violence is rampant among
the families where one of
the partners indulges in
very high consumption of
___ ___

4 / 70

4.

Earthquakes are recorded
with

5 / 70

5.

Affiliation and religion have
become fundamental
elements of post
Nigeria

6 / 70

6.

_______ is the crime of
seizing property through
violence or intimidation

7 / 70

7.

____ ___ can be described
as that aspect of security
designed purposely to
provide protection for
specific purposely to
provide protection for
specific infrastructure
particularly those
infrastructure considered
critical

8 / 70

8.

crisis in North Nigerian
states where some antiWestern education Muslim
fanatics engaged security
agents in bloody battle is
called ___ ___

9 / 70

9.

___ is a type of tropical
cyclone which is a generic
term for a low pressure
system that generally forms
in the tropics

10 / 70

10.

According to ___________
(2004) simulation helps to
reduce the situation of crisis
in patients

11 / 70

11.

Anti-Virus was designed
purposely to identify ___

12 / 70

12.

believes that crimes control
can be carried out through
the application of large pin
maps to illustrate the area
where crimes occurred

13 / 70

13.

____ are spies used in
espionage intelligence
collection

14 / 70

14.

False _____ errors are
those errors that bother on
the possibility of wrongfully
labelling an innocent
person as a crime
suspect/criminal due to
mistakes in the result of our
automated data analysis.

15 / 70

15.

is a methods which involves
one secretly listening to a
private conversation or
discussion

16 / 70

16.

The word security
emanated from the Greek
word se-curari meaning ___
___

17 / 70

17.

are spies used in
espionage intelligence
collection

18 / 70

18.

________ can be defined
as a means of protecting
information systems from
any illegitimate access and
uses, theft, amendment or
malicious attack

19 / 70

19. Idealism; meaning ___

20 / 70

20.

The following are the
proponent s of the youth
bulge theory except one

21 / 70

21.

Approaches to Public
Relation Management in
security sectors are the
following except one.

22 / 70

22.

Data-mining and
are very important tools of
security threat management
as well as intelligence
collection and analysis

23 / 70

23.

is a process of gathering
and assembling information
through several methods
for the purpose of
production intelligence

24 / 70

24.

Identify the one that is not
types of security

25 / 70

25.

Data mining uses a tool that
makes use of automated
analysis techniques

26 / 70

26.

is a methods which involves
one secretly listening to a
private conversation or
discussio

27 / 70

27.

Job design is a principle of
management.

28 / 70

28.

The word security
emanated from the Greek
word se-curari meaning

29 / 70

29.

___ ___ is a place that
involves an aspect of
transportation

30 / 70

30.

Terrorism trod its semantic
pathway to the English
usage in_______

31 / 70

31.

usually involves
submerging of land by
overflowing water

32 / 70

32. War gaming is a

33 / 70

33.

Choose the one that does
not belong to the type of
training

34 / 70

34.

usually, involves collecting,
analyzing, evaluating and
dissemination information
that can protect a nation
against internal threats.

35 / 70

35.

The actions targeted
towards the wrong or
improper use of another
person are known as

36 / 70

36.

are support personnel who
assist the spies in
managing their clandestine
communication by
securiting them against
energy’s interception or
detection

37 / 70

37.

Nigeria has continued to
pose a huge
_risk to the country

38 / 70

38.

An earthquake is also
known as___

39 / 70

39.

General
(GAS) describes the stages
an individual encounters in
stressful conditions

40 / 70

40.

Thomas Hobbes (1962)
who argued that the
essence of a state is to
guarantee the ___ ___
property and ensure law

41 / 70

41.

Choose the one that does
not belong to the type of
trainings

42 / 70

42.

Simulation helps to reduce
the situation of crisis in
patients as stressed by
(2004)

43 / 70

43.

The methods of
interrogation includes the
following except one .Pick
the odd one

44 / 70

44.

Microkenel can be
described as a computer
kernel that enables relevant

45 / 70

45. War gaming is a

46 / 70

46.

Thomas Hobbes (1962)
argued that the essence of
a state is to guarantee the
___ ___ property and
ensure law

47 / 70

47.

The following are the forms
of violence crimes except
pick the incorrect options

48 / 70

48.

The concept of security has
undergone a transition from
conceptualization to a nontraditional meaning.

49 / 70

49.

Intelligence personnel,
Government institutions,
Mass Media,
communication technology
e. t.(c) are

50 / 70

50.

usually, involves collecting,
analyzing, evaluating and
dissemination information
that can protect a nation
against internal threats.

51 / 70

51.

The following are causes of
job stress except

52 / 70

52.

Non traditional security
threats includes one

53 / 70

53.

An earthquake can be said
to have
points

54 / 70

54.

The following are the
proponent s of the youth
bulge theory except one

55 / 70

55.

Military simulation is also
known as_________

56 / 70

56.

Which tool is used to
prevent any strange or
unintended person from
comprehending the content
of a message

57 / 70

57.

_____ involves putting
questions to persons with
the aim of getting
information which can help,
which can aid intelligence

58 / 70

58.

querries involve conducting
our investigation by moving
from unknown to known

59 / 70

59.

can be described as the act
of seizing and forcefully
taking possession of the
victim’s vehicle by the crime
offender through the use of
dangerous weapons
especially gun

60 / 70

60.

The process of gathering
and assembling information
through several methods
for the purpose of
production intelligence is

61 / 70

61.

Both theories believe that
high birth rate is the major
source of violence or war
but their views are slightly
different from each othe

62 / 70

62.

The following are the forms
of violence crimes except
pick the incorrect options

63 / 70

63.

Nigeria has continued to
pose a huge_______risk to
the country

64 / 70

64.

Affiliation and religion have
become fundamental
elements of post
Nigeria

65 / 70

65.

The approaches of
securities are___ ___ ___

66 / 70

66.

____ ____is the form of
violence crime in which a
person carries out violence
against another person
within the same household?

67 / 70

67.

___ ____ can be defined as
a means of protecting
information systems from
any illegitimate access and
uses, theft, amendment or
malicious attack

68 / 70

68.

Job design is a principle of
management

69 / 70

69.

The following are the forms
of violence crimes except
______ pick the incorrect
options

70 / 70

70.

usually involvos
submerging of land by
overflowing water

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link