CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

security threat is classified
into_______ divisions

2 / 50

2.

Element of preparedness in
civil security approaches
includes________

3 / 50

3.

The word terrorism was
popularised by the jacobins
who ruled____________

4 / 50

4.

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

5 / 50

5.

One of the various
approaches which involves
a network of activities is
________

6 / 50

6.

One vital element of the
subject based query is

7 / 50

7.

Tsunami is usually mounted
by some geological
conditions like_______

8 / 50

8.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

9 / 50

9.

The end of the Cold War in
____ has widened the
scope of security

10 / 50

10.

the use of poisonous gases
on any targeted persons
and ecosystem is

11 / 50

11.

The
threats include
earthquakes, volcanic
eruptions, tsunamis (tidal
waves) and landslides

12 / 50

12.

The threat which includes
flood and cyclone is

13 / 50

13.

s essential to tactical
analysis necessary for
crime forecasting and
geographic profiling

14 / 50

14.

Traditionally, the state is the
custodian and ultimate
beneficiary of the monopoly
use of violence as
advocated by

15 / 50

15.

During these periods in
pirates caught were
paraded before the public
and later subject to
execution.

16 / 50

16.

Violent criminal behaviors
designed primarily to
generate fear in the
community for political
purposes is

17 / 50

17.

The end of the cold war in
has widened the scope of
security studies

18 / 50

18.

The period in which threat
to security usually involved
state to state aggression is

19 / 50

19.

The process by which an
organisation protects and
secure its system
is_________

20 / 50

20.

The type of robbery been
phenomenal in South
Africa, U.S.A, Sweden and
Nigeria is

21 / 50

21.

Piracy usually involves a
very violent act perpetrated
by private parties of no
affiliation

22 / 50

22.

Chloroacetophenone (CN)
is a chemical agent used
for

23 / 50

23.

The deliberate act of
destroying another person's
property by fire is

24 / 50

24.

s a method through which
we analyse crime

25 / 50

25.

On food security,about -of
urban dwellers go about
with empty
stomach_______

26 / 50

26.

s an essential tool of crime
analysis

27 / 50

27.

The threat which usually
attract crowds with strong
emotional convictions to act
in unlawful ways is called

28 / 50

28.

Another word for "tsunami"
is _______

29 / 50

29.

The anti-colonial armed
struggle between the
imperial forces of portugal
and
mozambique[FRELIMO]
was in _______

30 / 50

30.

helps us in our analysis of
data to have more
information about the
subject and gives a clearer
picture of the subject.

31 / 50

31.

A hurricane is a type of
tropical ____________

32 / 50

32.

History has shown that the
first public virus removal
was performed by____

33 / 50

33.

Thunderstorm is an
example________threat

34 / 50

34.

The qualitative risk analysis
is the effort to determine
the ______probability

35 / 50

35.

During the Westphalia
period, the major threat to
the political sovereignty of
any State usually emanated
from ____State

36 / 50

36.

The type of demonstration
that can lead to the
breakdown of law and order
is

37 / 50

37.

A threat where the
offenders use deadly
weapons in the course of
carrying out their dastardly
act is called

38 / 50

38.

who defines terrorism as a
method whereby an
organised groups seeks to
achieve its avowed aims
through
violence__________

39 / 50

39.

Terrorism is coined from the
word_____

40 / 50

40.

The continual activites that
make protection of
mechanisms in information
security is _______

41 / 50

41.

When contaminations
cannot be processed and
neutralised by environment
we experienced _______
pollution

42 / 50

42.

1. According to ______the
State is the custodian and
ultimate beneficiary of the
monopoly use of violence

43 / 50

43.

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

44 / 50

44.

Basically, any intentional
and unintentional criminal
actions are 

45 / 50

45.

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

46 / 50

46.

According to DeRosa, the
process which involves
transforming the data to
make them useful is known
as

47 / 50

47.

Traditionally, assassination
was synonymous to covet
sanctioned killing of any
person.

48 / 50

48.

Another name for
Knowledge Discovery in
Database (KDD) is

49 / 50

49.

is very helpful to unravel
secrets in organised crimes
like terrorism,
assassination, armed
robbery and electoral
practices.

50 / 50

50.

The internal or external
threat that challenges the
authority of the state is
_________

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link