ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
A criminal offence which occurs when a person unlawfully obtains services from a person is
2 / 50
According to DeRosa, the process which involves transforming the data to make them useful is known as
3 / 50
The first phase to the incidence of hurricane is_____________
4 / 50
The word terrorism was popularised by the jacobins who ruled____________
5 / 50
The climatic change and environment pollution in Africa has increased _________
6 / 50
The mild application of intimidation and violence to bus passengers by criminal gangs is known as
7 / 50
In Lagos, Akala street in Mushin, Ajegunle, Okokomaiko, Iba, IjoraBadia are examples of in criminal locations
8 / 50
the geological security threat is an aspect of
9 / 50
0ne of the two issues that determine the existence of risk is the _______
10 / 50
The emergence of the cold war started in the yea
11 / 50
what involves safety against HIV-AIDS pandemicsis__________
12 / 50
Preparedness is the key element of civil security which has the view to_____violence
13 / 50
Adamsite (DM) is a chemical agent used as
14 / 50
is a subfield in criminology and security studies
15 / 50
Another name for earthquake is____________
16 / 50
Among the Greeks,earthquake is said to be caused by____________
17 / 50
In Nigeria, where the number of police personnel is very inadequate to provide any meaningful security calls for
18 / 50
If there is no provision of sufficient security at the seaport,this causes _______in that country
19 / 50
Infrastucture security is designed to provide protection for critical infrastructures such as __________
20 / 50
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
21 / 50
Insurgency is a form of security threat
22 / 50
Security threat can be described as a capacity to destroy the vital interests of other considered as
23 / 50
Terrorism is a ferocious use of violence, a form of
24 / 50
These tools above are effective tools for applications in crime prevention and
25 / 50
The type of robbery been phenomenal in South Africa, U.S.A, Sweden and Nigeria is
26 / 50
In international airports ,it is illegal for restaurant operators to use plates which terrorists may convert to______
27 / 50
Rapid rate of industrialisation is one of the factors responsible for the problem of ___________in communities
28 / 50
The civil security which has adequate knowledge of incidence of risk through the process of risk education is ______
29 / 50
Violent criminal behaviors designed primarily to generate fear in the community for political purposes is
30 / 50
An organised rebellion is aimed at over throwing a constituted through the use of subversion and armed conflict
31 / 50
The type of demonstration that can lead to the breakdown of law and order is
32 / 50
The threat which usually attract crowds with strong emotional convictions to act in unlawful ways is called
33 / 50
One of the basic manmade security threats is _____
34 / 50
Chloroacetophenone (CN) is a chemical agent used for
35 / 50
A threat which often involves the use of instruments of intimidation and coercion by a party(ies) against another party is
36 / 50
The liquid or solid that has very toxic effects on any targeted persons and ecosystem is_______
37 / 50
s an essential tool of crime analysis
38 / 50
Another name for demonstration is
39 / 50
who defines terrorism as a method whereby an organised groups seeks to achieve its avowed aims through violence__________
40 / 50
The threat which includes flood and cyclone is
41 / 50
Etymologically, the word Assassin emanated from the Arabic word
42 / 50
A hurricane is a type of tropical ____________
43 / 50
what is the measures used to provide physical protecton of resourses against deliberate and accidental threats_______
44 / 50
s a method through which we analyse crime
45 / 50
History has shown that the first public virus removal was performed by____
46 / 50
One great obstacle to the use of most of the warning facilities is the erratic nature of ________in Nigeria
47 / 50
defined terrorism as the theory behind the method whereby an organised group seeks to achieve its avowed aims through the use of violence
48 / 50
The central focus of computer security is the techniques that enhance the correct________
49 / 50
A threat where the offenders use deadly weapons in the course of carrying out their dastardly act is called
50 / 50
The transportation of a person against the person's will, usually to hold the person with illegal authority for ransom is
Restart quiz
Rate this quiz