CSS244
1 / 70
Traditionally, assassination was synonymous to covet sanctioned killing of any person.
2 / 70
The type of demonstration that can lead to the breakdown of law and order is
3 / 70
Piracy in the 17th and 18th centuries attracted penalty against the offenders
4 / 70
Violent criminal behaviors designed primarily to generate fear in the community for political purposes is
5 / 70
Terrorism became a regular vocabulary in the year______
6 / 70
This is one of the forms of terrorism________
7 / 70
0ne type of the anti-virus softwares in the market today is_______
8 / 70
enables security practitioners to put observable crime data to scientific testing through the processes of data collation, analysis and interpretation
9 / 70
On food security,about -of urban dwellers go about with empty stomach_______
10 / 70
The mild application of intimidation and violence to bus passengers by criminal gangs is known as
11 / 70
Climatic hazards basically include hurricane, flood and
12 / 70
the use of poisonous gases on any targeted persons and ecosystem is
13 / 70
Another word for "tsunami" is _______
14 / 70
1. According to ______the State is the custodian and ultimate beneficiary of the monopoly use of violence
15 / 70
Another name for sick-out strike is
16 / 70
Basically, any intentional and unintentional criminal actions are
17 / 70
Preparedness is the key element of civil security which has the view to_____violence
18 / 70
The threat which usually attract crowds with strong emotional convictions to act in unlawful ways is called
19 / 70
Element of preparedness in civil security approaches includes________
20 / 70
The type of robbery been phenomenal in South Africa, U.S.A, Sweden and Nigeria is
21 / 70
According to ______ civil security includes a better interdepartmental coordination
22 / 70
Terrorism is a ferocious use of violence, a form of
23 / 70
The terrorist attacks into the world trade center was linked to_________
24 / 70
The deliberate act of destroying another person's property by fire is
25 / 70
In Lagos, Akala street in Mushin, Ajegunle, Okokomaiko, Iba, IjoraBadia are examples of in criminal locations
26 / 70
The end of the Cold War in ____ has widened the scope of security
27 / 70
The threat which involve the malicious activities of man is known as
28 / 70
Infrastucture security is designed to provide protection for critical infrastructures such as __________
29 / 70
The word terrorism was popularised by the jacobins who ruled____________
30 / 70
The factors responsible for the various pollutions that generate environmental hazards is________
31 / 70
The ________ threats include armed robbery, assassination, computer intrusion, information hacking and corruption.
32 / 70
One of the basic manmade security threats is _____
33 / 70
The liquid or solid that has very toxic effects on any targeted persons and ecosystem is_______
34 / 70
The process by which an organisation protects and secure its system is_________
35 / 70
The civil security which has adequate knowledge of incidence of risk through the process of risk education is ______
36 / 70
One vital element of the subject based query is
37 / 70
0ne of the two issues that determine the existence of risk is the _______
38 / 70
what involves safety against HIV-AIDS pandemicsis__________
39 / 70
39. The Italian word for workto-rule strike is
40 / 70
The climatic forms of security threats have impact not only on man but on _______
41 / 70
climatic hazards are created by factors such as _________
42 / 70
Due to the Revolution in modern technology some computers demandinformation before an access is______
43 / 70
Etymologically, the word Assassin emanated from the Arabic word
44 / 70
In Engineering , risk is defined as the pobabilityof an accident times ______per accident
45 / 70
Security threat can be described as a capacity to destroy the vital interests of other considered as
46 / 70
Hurricane is an example of_____threat
47 / 70
who defines security threat as development that threaten the sovereignty of the state________
48 / 70
is a subfield in criminology and security studies
49 / 70
The leading factor to the problem of climatic change is the emission of _______ into the atmosphere
50 / 70
An organised rebellion is aimed at over throwing a constituted through the use of subversion and armed conflict
51 / 70
Another name for earthquake is____________
52 / 70
The continual activites that make protection of mechanisms in information security is _______
53 / 70
The emergence of the Cold War in____, the main challenge against state has been internal threat to security
54 / 70
Among the Greeks,earthquake is said to be caused by____________
55 / 70
Another name for Knowledge Discovery in Database (KDD) is
56 / 70
security threat is classified into_______ divisions
57 / 70
Adamsite (DM) is a chemical agent used as
58 / 70
is the process of analysing data from different perspectives and summarising it into useful information.
59 / 70
who defines terrorism as a method whereby an organised groups seeks to achieve its avowed aims through violence__________
60 / 70
The threat which includes flood and cyclone is
61 / 70
The quantitative risk analysis is the effort to determine the____probability
62 / 70
The transportation of a person against the person's will, usually to hold the person with illegal authority for ransom is
63 / 70
is very helpful to unravel secrets in organised crimes like terrorism, assassination, armed robbery and electoral practices.
64 / 70
s essential to tactical analysis necessary for crime forecasting and geographic profiling
65 / 70
The threats include earthquakes, volcanic eruptions, tsunamis (tidal waves) and landslides
66 / 70
is very useful to assist crime analysis to locate the hot spots or locations where particular crimes often take place.
67 / 70
Piracy is a violent crime and robbery which takes place on the
68 / 70
History has shown that the first public virus removal was performed by____
69 / 70
The activities of disloyal employees can affect the collapse of any if adequate mitigation measures are not taken
70 / 70
These tools above are effective tools for applications in crime prevention and
Restart quiz
Rate this quiz