CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

the geological security
threat is an aspect of

2 / 50

2.

Terrorism is coined from the
word_____

3 / 50

3.

Piracy is a violent crime
and robbery which takes
place on the

4 / 50

4.

enables security
practitioners to put
observable crime data to
scientific testing through the
processes of data collation,
analysis and interpretation

5 / 50

5.

The capacity of any human
and non-human elements
to destroy the vital interests
of others considered as
targets is _____

6 / 50

6.

The progressive destruction
and less capable of
sustaining vegetation
is_________

7 / 50

7.

Rapid rate of
industrialisation is one of
the factors responsible for
the problem of
___________in
communities

8 / 50

8.

A criminal act that relate to
illegal acquisition of another
person's property is called

9 / 50

9.

The internal or external
threat that challenges the
authority of the state is
_________

10 / 50

10.

The
threats include
earthquakes, volcanic
eruptions, tsunamis (tidal
waves) and landslides

11 / 50

11.

is the tool to probe further
as a search light to what
may constitute an act of
criminality

12 / 50

12.

helps us in our analysis of
data to have more
information about the
subject and gives a clearer
picture of the subject.

13 / 50

13.

In Engineering , risk is
defined as the pobabilityof
an accident times
______per accident

14 / 50

14.

The emergence of the cold
war started in the yea

15 / 50

15.

Before the advent of
internet ,computer virus
were usually spread
through __________

16 / 50

16.

These tools above are
effective tools for
applications in crime
prevention and

17 / 50

17.

It is a fact that food security
is not luxury but_______

18 / 50

18.

The threat which involves
entrapment of the
environment with various
forms of pollution is

19 / 50

19.

A hurricane is a type of
tropical ____________

20 / 50

20.

climatic hazards are
created by factors such as
_________

21 / 50

21.

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

22 / 50

22.

Among the
Greeks,earthquake is said
to be caused
by____________

23 / 50

23.

Thunderstorm is an
example________threat

24 / 50

24.

A criminal offence which
occurs when a person
unlawfully obtains services
from a person is

25 / 50

25.

s essential to tactical
analysis necessary for
crime forecasting and
geographic profiling

26 / 50

26.

The process through which
we use computer to
develop a large database is
known as

27 / 50

27.

Hurricane is an example
of_____threat

28 / 50

28.

A threat that takes place on
the road, streets, or even
bridges is

29 / 50

29.

0ne type of the anti-virus
softwares in the market
today is_______

30 / 50

30.

defined terrorism as the
theory behind the method
whereby an organised
group seeks to achieve its
avowed aims through the
use of violence

31 / 50

31.

Link analysis is very
popular among
practitioners

32 / 50

32.

One of the effects of
Environmental pollution is
________

33 / 50

33.

what involves safety
against HIV-AIDS
pandemicsis__________

34 / 50

34.

Another word for "tsunami"
is _______

35 / 50

35.

The factors chiefly
responsible for various
environmental pollutions
are

36 / 50

36.

Infrastucture security is
designed to provide
protection for critical
infrastructures such as
__________

37 / 50

37.

One vital element of the
subject based query is

38 / 50

38.

Etymologically,the word
"tsunami" emanate from
the______ language

39 / 50

39.

Another name for sick-out
strike is

40 / 50

40.

When contaminations
cannot be processed and
neutralised by environment
we experienced _______
pollution

41 / 50

41.

The transportation of a
person against the person's
will, usually to hold the
person with illegal authority
for ransom is

42 / 50

42.

who defines security threat
as development that
threaten the sovereignty of
the state________

43 / 50

43.

Climatic hazards basically
include hurricane, flood and

44 / 50

44.

is the process of analysing
data from different
perspectives and
summarising it into useful
information.

45 / 50

45.

The word terrorism was
popularised by the jacobins
who ruled____________

46 / 50

46.

Traditionally, the state is the
custodian and ultimate
beneficiary of the monopoly
use of violence as
advocated by

47 / 50

47.

Terrorism is a ______
threat

48 / 50

48. The Italian word for workto-rule strike is

49 / 50

49.

An effective public warnings
in responding to disaster
reduces _______

50 / 50

50.

The measures that ensure
every individual entitlement
to employment and living
wage is_________

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link