CSS244



Category: CSS244

0

CSS244

1 / 70

1.

Traditionally, assassination
was synonymous to covet
sanctioned killing of any
person.

2 / 70

2.

The type of demonstration
that can lead to the
breakdown of law and order
is

3 / 70

3.

Piracy in the 17th and 18th
centuries attracted
penalty against the
offenders

4 / 70

4.

Violent criminal behaviors
designed primarily to
generate fear in the
community for political
purposes is

5 / 70

5.

Terrorism became a regular
vocabulary in the
year______

6 / 70

6.

This is one of the forms of
terrorism________

7 / 70

7.

0ne type of the anti-virus
softwares in the market
today is_______

8 / 70

8.

enables security
practitioners to put
observable crime data to
scientific testing through the
processes of data collation,
analysis and interpretation

9 / 70

9.

On food security,about -of
urban dwellers go about
with empty
stomach_______

10 / 70

10.

The mild application of
intimidation and violence to
bus passengers by criminal
gangs is known as

11 / 70

11.

Climatic hazards basically
include hurricane, flood and

12 / 70

12.

the use of poisonous gases
on any targeted persons
and ecosystem is

13 / 70

13.

Another word for "tsunami"
is _______

14 / 70

14.

1. According to ______the
State is the custodian and
ultimate beneficiary of the
monopoly use of violence

15 / 70

15.

Another name for sick-out
strike is

16 / 70

16.

Basically, any intentional
and unintentional criminal
actions are 

17 / 70

17.

Preparedness is the key
element of civil security
which has the view
to_____violence

18 / 70

18.

The threat which usually
attract crowds with strong
emotional convictions to act
in unlawful ways is called

19 / 70

19.

Element of preparedness in
civil security approaches
includes________

20 / 70

20.

The type of robbery been
phenomenal in South
Africa, U.S.A, Sweden and
Nigeria is

21 / 70

21.

According to ______ civil
security includes a better
interdepartmental
coordination

22 / 70

22.

Terrorism is a ferocious use
of violence, a form of

23 / 70

23.

The terrorist attacks into the
world trade center was
linked to_________

24 / 70

24.

The deliberate act of
destroying another person's
property by fire is

25 / 70

25.

In Lagos, Akala street in
Mushin, Ajegunle,
Okokomaiko, Iba, IjoraBadia are examples of
in criminal locations

26 / 70

26.

The end of the Cold War in
____ has widened the
scope of security

27 / 70

27.

The threat which involve
the malicious activities of
man is known as

28 / 70

28.

Infrastucture security is
designed to provide
protection for critical
infrastructures such as
__________

29 / 70

29.

The word terrorism was
popularised by the jacobins
who ruled____________

30 / 70

30.

The factors responsible for
the various pollutions that
generate environmental
hazards is________

31 / 70

31.

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

32 / 70

32.

One of the basic manmade
security threats is _____

33 / 70

33.

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

34 / 70

34.

The process by which an
organisation protects and
secure its system
is_________

35 / 70

35.

The civil security which has
adequate knowledge of
incidence of risk through
the process of risk
education is ______

36 / 70

36.

One vital element of the
subject based query is

37 / 70

37.

0ne of the two issues that
determine the existence of
risk is the _______

38 / 70

38.

what involves safety
against HIV-AIDS
pandemicsis__________

39 / 70

39. The Italian word for workto-rule strike is

40 / 70

40.

The climatic forms of
security threats have
impact not only on man but
on _______

41 / 70

41.

climatic hazards are
created by factors such as
_________

42 / 70

42.

Due to the Revolution in
modern technology some
computers demandinformation before an
access is______

43 / 70

43.

Etymologically, the word
Assassin emanated from
the Arabic word

44 / 70

44.

In Engineering , risk is
defined as the pobabilityof
an accident times
______per accident

45 / 70

45.

Security threat can be
described as a capacity to
destroy the vital interests of
other considered as

46 / 70

46.

Hurricane is an example
of_____threat

47 / 70

47.

who defines security threat
as development that
threaten the sovereignty of
the state________

48 / 70

48.

is a subfield in criminology
and security studies

49 / 70

49.

The leading factor to the
problem of climatic change
is the emission of _______
into the atmosphere

50 / 70

50.

An organised rebellion is
aimed at over throwing a
constituted
through the use of
subversion and armed
conflict

51 / 70

51.

Another name for
earthquake
is____________

52 / 70

52.

The continual activites that
make protection of
mechanisms in information
security is _______

53 / 70

53.

The emergence of the Cold
War in____, the main
challenge against state has
been internal threat to
security

54 / 70

54.

Among the
Greeks,earthquake is said
to be caused
by____________

55 / 70

55.

Another name for
Knowledge Discovery in
Database (KDD) is

56 / 70

56.

security threat is classified
into_______ divisions

57 / 70

57.

Adamsite (DM) is a
chemical agent used as

58 / 70

58.

is the process of analysing
data from different
perspectives and
summarising it into useful
information.

59 / 70

59.

who defines terrorism as a
method whereby an
organised groups seeks to
achieve its avowed aims
through
violence__________

60 / 70

60.

The threat which includes
flood and cyclone is

61 / 70

61.

The quantitative risk
analysis is the effort to
determine
the____probability

62 / 70

62.

The transportation of a
person against the person's
will, usually to hold the
person with illegal authority
for ransom is

63 / 70

63.

is very helpful to unravel
secrets in organised crimes
like terrorism,
assassination, armed
robbery and electoral
practices.

64 / 70

64.

s essential to tactical
analysis necessary for
crime forecasting and
geographic profiling

65 / 70

65.

The
threats include
earthquakes, volcanic
eruptions, tsunamis (tidal
waves) and landslides

66 / 70

66.

is very useful to assist
crime analysis to locate the
hot spots or locations
where particular crimes
often take place.

67 / 70

67.

Piracy is a violent crime
and robbery which takes
place on the

68 / 70

68.

History has shown that the
first public virus removal
was performed by____

69 / 70

69.

The activities of disloyal
employees can affect the
collapse of any
if adequate mitigation
measures are not taken

70 / 70

70.

These tools above are
effective tools for
applications in crime
prevention and

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link