CSS241
1 / 70
Earthquakes are recorded with
2 / 70
___ ____ are persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset
3 / 70
___ is a type of tropical cyclone which is a generic term for a low pressure system that generally forms in the tropics
4 / 70
Job design is a principle of management.
5 / 70
______ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
6 / 70
6. Idealism; meaning ___
7 / 70
Which tool is used to prevent any strange or unintended person from comprehending the content of a message
8 / 70
is a methods which involves one secretly listening to a private conversation or discussio
9 / 70
usually involvos submerging of land by overflowing water
10 / 70
Marxist theory is one of the theories of crime control.
11 / 70
s the indent consequence of communication breakdown in the cycle of domestic violence
12 / 70
Nigeria has continued to pose a huge _risk to the country
13 / 70
Intelligence personnel, Government institutions, Mass Media, communication technology e. t.(c) are
14 / 70
An earthquake can be said to have points
15 / 70
is a process of gathering and assembling information through several methods for the purpose of production intelligence
16 / 70
________ can be defined as a means of protecting information systems from any illegitimate access and uses, theft, amendment or malicious attack
17 / 70
The following are the forms of violence crimes except pick the incorrect options
18 / 70
____ are spies used in espionage intelligence collection
19 / 70
are support personnel who assist the spies in managing their clandestine communication by securiting them against energy’s interception or detection
20 / 70
After car jacking, one should seek
21 / 70
An earthquake is also known as___
22 / 70
Another safety tip is to have a comprehensive for your vehicle.
23 / 70
____ ____is the form of violence crime in which a person carries out violence against another person within the same household?
24 / 70
can be described as the act of seizing and forcefully taking possession of the victim’s vehicle by the crime offender through the use of dangerous weapons especially gun
25 / 70
_____ is a good tool in information supping which are used by both criminals and law enforcement agents
26 / 70
The methods of interrogation includes the following except one .Pick the odd one
27 / 70
The methods of including suggestibility, Reid, Deception and torture
28 / 70
Anti-Virus designed purposely to identify _________
29 / 70
Threats which can damage infrastructure basically include the following except___ ___
30 / 70
31 / 70
Military simulation is also known as_________
32 / 70
believes that crimes control can be carried out through the application of large pin maps to illustrate the area where crimes occurred
33 / 70
33. War gaming is a
34 / 70
Research finding has shown that couples that both provide ___ ___to the family on equal terms experience less incidence of violence
35 / 70
__ has become alternative route through which people can meet their needs?
36 / 70
believes that the best way through which we can control crime is to examine the nature of the crime the conditions that produces such crimes as well as the impact of the crimes
37 / 70
is the act of watching or observing people or objects
38 / 70
The following are the forms of violence crimes except ____ ____ pick the incorrect options
39 / 70
Microkenel can be described as a computer kernel that enables relevant
40 / 70
Approaches to Public Relation Management in security sectors are the following except one
41 / 70
The concept of security has undergone a transition from conceptualization to a nontraditional meaning.
42 / 70
False _____ errors are those errors that bother on the possibility of wrongfully labelling an innocent person as a crime suspect/criminal due to mistakes in the result of our automated data analysis.
43 / 70
Individual can carry out a just violence if the Government is
44 / 70
Affiliation and religion have become fundamental elements of post ____ Nigeria
45 / 70
The following are the proponent s of the youth bulge theory except one
46 / 70
Simulation helps to reduce the situation of crisis in patients as stressed by (2004)
47 / 70
Data mining can also be described as the process of patterns from data
48 / 70
Choose the one that does not belong to the type of trainings
49 / 70
During the westphalia period the treat security usually involved____ ____
50 / 70
One of the causes of job stress is
51 / 70
can be described as a tool designed to find previously unknown knowledge through links, associations, and patterns in data
52 / 70
Hurricane entail sea surface temperatures of at least
53 / 70
________ is usually involves submerging of land by overflowing water
54 / 70
usually, involves collecting, analyzing, evaluating and dissemination information that can protect a nation against internal threats.
55 / 70
The situation of domestic violence is rampant among the families where one of the partners indulges in very high consumption of ___ ___
56 / 70
57 / 70
58 / 70
___________ is also known as war-gaming.
59 / 70
Anti-Virus was designed purposely to identify ___
60 / 70
61 / 70
The following are the theories of crime control except one
62 / 70
The process of gathering and assembling information through several methods for the purpose of production intelligence is
63 / 70
Identify the one that is not types of security
64 / 70
_____ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence
65 / 70
Thomas Hobbes (1962) argued that the essence of a state is to guarantee the ___ ___ property and ensure law
66 / 70
Non traditional security threats includes one
67 / 70
Karl marx is one of the proponents of the youth bulge theory
68 / 70
___ is a process of gathering and assembling information through several methods for the purpose of production intelligence
69 / 70
Avoid looking at the robbers on the face so as to avoid the issue of threat of
70 / 70
Affiliation and religion have become fundamental elements of post Nigeria
Restart quiz
Rate this quiz