ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
The progressive destruction and less capable of sustaining vegetation is_________
2 / 50
who defines terrorism as a method whereby an organised groups seeks to achieve its avowed aims through violence__________
3 / 50
On food security,about -of urban dwellers go about with empty stomach_______
4 / 50
enables security practitioners to put observable crime data to scientific testing through the processes of data collation, analysis and interpretation
5 / 50
In Engineering , risk is defined as the pobabilityof an accident times ______per accident
6 / 50
involves conducting our investigation by moving from unknown to known
7 / 50
Etymologically, the word Assassin emanated from the Arabic word
8 / 50
enables the law enforcements to identify the most probable residential locations that criminals live.
9 / 50
computer security provides a platform which enhance quality attributes like_____
10 / 50
Chloroacetophenone (CN) is a chemical agent used for
11 / 50
Security threat can be described as a capacity to destroy the vital interests of other considered as
12 / 50
The continual activites that make protection of mechanisms in information security is _______
13 / 50
History has shown that the first public virus removal task was performed in________
14 / 50
A criminal act that relate to illegal acquisition of another person's property is called
15 / 50
Hurricane is an example of_____threat
16 / 50
The first phase to the incidence of hurricane is_____________
17 / 50
One great obstacle to the use of most of the warning facilities is the erratic nature of ________in Nigeria
18 / 50
security threat is classified into_______ divisions
19 / 50
A criminal offence which occurs when a person unlawfully obtains services from a person is
20 / 50
The emergence of the Cold War in____, the main challenge against state has been internal threat to security
21 / 50
According to ______ civil security includes a better interdepartmental coordination
22 / 50
The anti-colonial armed struggle between the imperial forces of portugal and mozambique[FRELIMO] was in _______
23 / 50
One vital element of the subject based query is
24 / 50
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
25 / 50
s the direct application that comes form considering the inherent geography in crime
26 / 50
A law enforcement function that involves a systematic analysis for identifying and analysing patterns and trends in crime and disorder is called
27 / 50
A threat that takes place on the road, streets, or even bridges is
28 / 50
One of the effects of Environmental pollution is ________
29 / 50
Terrorism is coined from the word_____
30 / 50
The type of robbery been phenomenal in South Africa, U.S.A, Sweden and Nigeria is
31 / 50
is very helpful to unravel secrets in organised crimes like terrorism, assassination, armed robbery and electoral practices.
32 / 50
The process of wrongfully labelling an innocent person as a criminal due to mistakes is the result of our automated data analysis is called
33 / 50
The internal or external threat that challenges the authority of the state is _________
34 / 50
The threat which usually attract crowds with strong emotional convictions to act in unlawful ways is called
35 / 50
Another word for "tsunami" is _______
36 / 50
The emergence of the cold war started in the yea
37 / 50
Terrorism became a regular vocabulary in the year______
38 / 50
what is the measures used to provide physical protecton of resourses against deliberate and accidental threats_______
39 / 50
In international airports ,it is illegal for restaurant operators to use plates which terrorists may convert to______
40 / 50
Climatic hazards basically include hurricane, flood and
41 / 50
An organised rebellion is aimed at over throwing a constituted through the use of subversion and armed conflict
42 / 50
The climatic forms of security threats have impact not only on man but on _______
43 / 50
Terrorism is a ferocious use of violence, a form of
44 / 50
The quantitative risk analysis is the effort to determine the____probability
45 / 50
Due to the Revolution in modern technology some computers demandinformation before an access is______
46 / 50
Another name for demonstration is
47 / 50
the geological security threat is an aspect of
48 / 50
One of themajor environmental threats is ___________
49 / 50
In Nigeria, where the number of police personnel is very inadequate to provide any meaningful security calls for
50 / 50
Preparedness is the key element of civil security which has the view to_____violence
Restart quiz
Rate this quiz