ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
the geological security threat is an aspect of
2 / 50
Terrorism is coined from the word_____
3 / 50
Piracy is a violent crime and robbery which takes place on the
4 / 50
enables security practitioners to put observable crime data to scientific testing through the processes of data collation, analysis and interpretation
5 / 50
The capacity of any human and non-human elements to destroy the vital interests of others considered as targets is _____
6 / 50
The progressive destruction and less capable of sustaining vegetation is_________
7 / 50
Rapid rate of industrialisation is one of the factors responsible for the problem of ___________in communities
8 / 50
A criminal act that relate to illegal acquisition of another person's property is called
9 / 50
The internal or external threat that challenges the authority of the state is _________
10 / 50
The threats include earthquakes, volcanic eruptions, tsunamis (tidal waves) and landslides
11 / 50
is the tool to probe further as a search light to what may constitute an act of criminality
12 / 50
helps us in our analysis of data to have more information about the subject and gives a clearer picture of the subject.
13 / 50
In Engineering , risk is defined as the pobabilityof an accident times ______per accident
14 / 50
The emergence of the cold war started in the yea
15 / 50
Before the advent of internet ,computer virus were usually spread through __________
16 / 50
These tools above are effective tools for applications in crime prevention and
17 / 50
It is a fact that food security is not luxury but_______
18 / 50
The threat which involves entrapment of the environment with various forms of pollution is
19 / 50
A hurricane is a type of tropical ____________
20 / 50
climatic hazards are created by factors such as _________
21 / 50
The ________ threats include armed robbery, assassination, computer intrusion, information hacking and corruption.
22 / 50
Among the Greeks,earthquake is said to be caused by____________
23 / 50
Thunderstorm is an example________threat
24 / 50
A criminal offence which occurs when a person unlawfully obtains services from a person is
25 / 50
s essential to tactical analysis necessary for crime forecasting and geographic profiling
26 / 50
The process through which we use computer to develop a large database is known as
27 / 50
Hurricane is an example of_____threat
28 / 50
A threat that takes place on the road, streets, or even bridges is
29 / 50
0ne type of the anti-virus softwares in the market today is_______
30 / 50
defined terrorism as the theory behind the method whereby an organised group seeks to achieve its avowed aims through the use of violence
31 / 50
Link analysis is very popular among practitioners
32 / 50
One of the effects of Environmental pollution is ________
33 / 50
what involves safety against HIV-AIDS pandemicsis__________
34 / 50
Another word for "tsunami" is _______
35 / 50
The factors chiefly responsible for various environmental pollutions are
36 / 50
Infrastucture security is designed to provide protection for critical infrastructures such as __________
37 / 50
One vital element of the subject based query is
38 / 50
Etymologically,the word "tsunami" emanate from the______ language
39 / 50
Another name for sick-out strike is
40 / 50
When contaminations cannot be processed and neutralised by environment we experienced _______ pollution
41 / 50
The transportation of a person against the person's will, usually to hold the person with illegal authority for ransom is
42 / 50
who defines security threat as development that threaten the sovereignty of the state________
43 / 50
Climatic hazards basically include hurricane, flood and
44 / 50
is the process of analysing data from different perspectives and summarising it into useful information.
45 / 50
The word terrorism was popularised by the jacobins who ruled____________
46 / 50
Traditionally, the state is the custodian and ultimate beneficiary of the monopoly use of violence as advocated by
47 / 50
Terrorism is a ______ threat
48 / 50
48. The Italian word for workto-rule strike is
49 / 50
An effective public warnings in responding to disaster reduces _______
50 / 50
The measures that ensure every individual entitlement to employment and living wage is_________
Restart quiz
Rate this quiz