CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

A criminal offence which
occurs when a person
unlawfully obtains services
from a person is

2 / 50

2.

According to DeRosa, the
process which involves
transforming the data to
make them useful is known
as

3 / 50

3.

The first phase to the
incidence of hurricane
is_____________

4 / 50

4.

The word terrorism was
popularised by the jacobins
who ruled____________

5 / 50

5.

The climatic change and
environment pollution in
Africa has increased
_________

6 / 50

6.

The mild application of
intimidation and violence to
bus passengers by criminal
gangs is known as

7 / 50

7.

In Lagos, Akala street in
Mushin, Ajegunle,
Okokomaiko, Iba, IjoraBadia are examples of
in criminal locations

8 / 50

8.

the geological security
threat is an aspect of

9 / 50

9.

0ne of the two issues that
determine the existence of
risk is the _______

10 / 50

10.

The emergence of the cold
war started in the yea

11 / 50

11.

what involves safety
against HIV-AIDS
pandemicsis__________

12 / 50

12.

Preparedness is the key
element of civil security
which has the view
to_____violence

13 / 50

13.

Adamsite (DM) is a
chemical agent used as

14 / 50

14.

is a subfield in criminology
and security studies

15 / 50

15.

Another name for
earthquake
is____________

16 / 50

16.

Among the
Greeks,earthquake is said
to be caused
by____________

17 / 50

17.

In Nigeria, where the
number of police personnel
is very inadequate to
provide any meaningful
security calls for

18 / 50

18.

If there is no provision of
sufficient security at the
seaport,this causes
_______in that country

19 / 50

19.

Infrastucture security is
designed to provide
protection for critical
infrastructures such as
__________

20 / 50

20.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

21 / 50

21.

Insurgency is a form of
security threat

22 / 50

22.

Security threat can be
described as a capacity to
destroy the vital interests of
other considered as

23 / 50

23.

Terrorism is a ferocious use
of violence, a form of

24 / 50

24.

These tools above are
effective tools for
applications in crime
prevention and

25 / 50

25.

The type of robbery been
phenomenal in South
Africa, U.S.A, Sweden and
Nigeria is

26 / 50

26.

In international airports ,it is
illegal for restaurant
operators to use plates
which terrorists may
convert to______

27 / 50

27.

Rapid rate of
industrialisation is one of
the factors responsible for
the problem of
___________in
communities

28 / 50

28.

The civil security which has
adequate knowledge of
incidence of risk through
the process of risk
education is ______

29 / 50

29.

Violent criminal behaviors
designed primarily to
generate fear in the
community for political
purposes is

30 / 50

30.

An organised rebellion is
aimed at over throwing a
constituted
through the use of
subversion and armed
conflict

31 / 50

31.

The type of demonstration
that can lead to the
breakdown of law and order
is

32 / 50

32.

The threat which usually
attract crowds with strong
emotional convictions to act
in unlawful ways is called

33 / 50

33.

One of the basic manmade
security threats is _____

34 / 50

34.

Chloroacetophenone (CN)
is a chemical agent used
for

35 / 50

35.

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

36 / 50

36.

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

37 / 50

37.

s an essential tool of crime
analysis

38 / 50

38.

Another name for
demonstration is

39 / 50

39.

who defines terrorism as a
method whereby an
organised groups seeks to
achieve its avowed aims
through
violence__________

40 / 50

40.

The threat which includes
flood and cyclone is

41 / 50

41.

Etymologically, the word
Assassin emanated from
the Arabic word

42 / 50

42.

A hurricane is a type of
tropical ____________

43 / 50

43.

what is the measures used
to provide physical
protecton of resourses
against deliberate and
accidental threats_______

44 / 50

44.

s a method through which
we analyse crime

45 / 50

45.

History has shown that the
first public virus removal
was performed by____

46 / 50

46.

One great obstacle to the
use of most of the warning
facilities is the erratic nature
of ________in Nigeria

47 / 50

47.

defined terrorism as the
theory behind the method
whereby an organised
group seeks to achieve its
avowed aims through the
use of violence

48 / 50

48.

The central focus of
computer security is the
techniques that enhance
the correct________

49 / 50

49.

A threat where the
offenders use deadly
weapons in the course of
carrying out their dastardly
act is called

50 / 50

50.

The transportation of a
person against the person's
will, usually to hold the
person with illegal authority
for ransom is

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link