CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

If there is no provision of
sufficient security at the
seaport,this causes
_______in that country

2 / 50

2.

The
threats include
earthquakes, volcanic
eruptions, tsunamis (tidal
waves) and landslides

3 / 50

3.

who defines terrorism as a
method whereby an
organised groups seeks to
achieve its avowed aims
through
violence__________

4 / 50

4.

The type of robbery been
phenomenal in South
Africa, U.S.A, Sweden and
Nigeria is

5 / 50

5.

In Lagos, Akala street in
Mushin, Ajegunle,
Okokomaiko, Iba, IjoraBadia are examples of
in criminal locations

6 / 50

6.

what involves safety
against HIV-AIDS
pandemicsis__________

7 / 50

7.

Chloroacetophenone (CN)
is a chemical agent used
for

8 / 50

8.

Violent criminal behaviors
designed primarily to
generate fear in the
community for political
purposes is

9 / 50

9.

involves conducting our
investigation by moving
from unknown to known

10 / 50

10.

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

11 / 50

11.

In international airports ,it is
illegal for restaurant
operators to use plates
which terrorists may
convert to______

12 / 50

12.

With the experience from
the september 11 terrorist
attck in the USA, most
countries have fortified their
airports with______

13 / 50

13.

Seaports are major
shipping places that are
vulnerable to security
_________

14 / 50

14.

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

15 / 50

15.

Rapid rate of
industrialisation is one of
the factors responsible for
the problem of
___________in
communities

16 / 50

16.

In Nigeria, where the
number of police personnel
is very inadequate to
provide any meaningful
security calls for

17 / 50

17.

Among the
Greeks,earthquake is said
to be caused
by____________

18 / 50

18.

Climatic hazards basically
include hurricane, flood and

19 / 50

19.

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

20 / 50

20.

Tsunami is usually mounted
by some geological
conditions like_______

21 / 50

21.

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

22 / 50

22.

Due to the Revolution in
modern technology some
computers demandinformation before an
access is______

23 / 50

23.

Another word for "tsunami"
is _______

24 / 50

24.

s a method through which
we analyse crime

25 / 50

25.

computer security is
described as an aspectof
_____security

26 / 50

26.

Hurricane is an example
of_____threat

27 / 50

27.

The climatic change and
environment pollution in
Africa has increased
_________

28 / 50

28.

The qualitative risk analysis
is the effort to determine
the ______probability

29 / 50

29.

Etymologically,the word
"tsunami" emanate from
the______ language

30 / 50

30.

The threat which includes
flood and cyclone is

31 / 50

31.

The activities of disloyal
employees can affect the
collapse of any
if adequate mitigation
measures are not taken

32 / 50

32.

An organised rebellion is
aimed at over throwing a
constituted
through the use of
subversion and armed
conflict

33 / 50

33.

The period in which threat
to security usually involved
state to state aggression is

34 / 50

34.

The transportation of a
woman against her will for
ransom is labelled

35 / 50

35.

is a subfield in criminology
and security studies

36 / 50

36.

The continual activites that
make protection of
mechanisms in information
security is _______

37 / 50

37.

Terrorism is a ______
threat

38 / 50

38.

A threat that takes place on
the road, streets, or even
bridges is

39 / 50

39.

security threat is classified
into_______ divisions

40 / 50

40.

The word terrorism was
popularised by the jacobins
who ruled____________

41 / 50

41.

Another name for
Knowledge Discovery in
Database (KDD) is

42 / 50

42.

enables the law
enforcements to identify the
most probable residential
locations that criminals live.

43 / 50

43.

During these periods in
pirates caught were
paraded before the public
and later subject to
execution.

44 / 50

44.

enables security
practitioners to put
observable crime data to
scientific testing through the
processes of data collation,
analysis and interpretation

45 / 50

45.

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

46 / 50

46.

According to DeRosa, the
process which involves
transforming the data to
make them useful is known
as

47 / 50

47.

is the process of analysing
data from different
perspectives and
summarising it into useful
information.

48 / 50

48.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

49 / 50

49.

The end of the cold war in
has widened the scope of
security studies

50 / 50

50.

Basically, any intentional
and unintentional criminal
actions are 

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link