ATTENTION:
Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.
Good luck!
CSS244
1 / 50
is a subfield in criminology and security studies
2 / 50
s essential to tactical analysis necessary for crime forecasting and geographic profiling
3 / 50
s a method through which we analyse crime
4 / 50
A threat where the offenders use deadly weapons in the course of carrying out their dastardly act is called
5 / 50
The factors chiefly responsible for various environmental pollutions are
6 / 50
The anti-colonial armed struggle between the imperial forces of portugal and mozambique[FRELIMO] was in _______
7 / 50
what is the measures used to provide physical protecton of resourses against deliberate and accidental threats_______
8 / 50
Another name for sick-out strike is
9 / 50
The factors responsible for the various pollutions that generate environmental hazards is________
10 / 50
Another word for "tsunami" is _______
11 / 50
The god of earthquake in Greek mythology is____________
12 / 50
who said that a method by which awareness and understanding can be translated into action include a range of activities______
13 / 50
The internal or external threat that challenges the authority of the state is _________
14 / 50
The threat which includes flood and cyclone is
15 / 50
The process by which an organisation protects and secure its system is_________
16 / 50
Element of preparedness in civil security approaches includes________
17 / 50
is the tool designated to find previously unknown knowledge through links, association and patterns in data.
18 / 50
The process of wrongfully labelling an innocent person as a criminal due to mistakes is the result of our automated data analysis is called
19 / 50
The type of demonstration that can lead to the breakdown of law and order is
20 / 50
climatic hazards are created by factors such as _________
21 / 50
The use of crime mapping through installation of security gadgets like CCTV's and secret camera's are helpful to identify
22 / 50
The measures and actions taken by a company to protects its corporate image and establish regulations is_______
23 / 50
The end of the Cold War in ____ has widened the scope of security
24 / 50
History has shown that the first public virus removal was performed by____
25 / 50
is very helpful to unravel secrets in organised crimes like terrorism, assassination, armed robbery and electoral practices.
26 / 50
According to ______ civil security includes a better interdepartmental coordination
27 / 50
Preparedness is the key element of civil security which has the view to_____violence
28 / 50
The transportation of a person against the person's will, usually to hold the person with illegal authority for ransom is
29 / 50
who said that enemies may hide destructive objects in containers which they later use against a country _________
30 / 50
Terrorism is a ferocious use of violence, a form of
31 / 50
is often applied at various levels of law enforcement in any community to know the situations of crime and ways to reduce it
32 / 50
enables security practitioners to put observable crime data to scientific testing through the processes of data collation, analysis and interpretation
33 / 50
The process through which we use computer to develop a large database is known as
34 / 50
The civil security which has adequate knowledge of incidence of risk through the process of risk education is ______
35 / 50
A threat which often involves the use of instruments of intimidation and coercion by a party(ies) against another party is
36 / 50
The ________ threats include armed robbery, assassination, computer intrusion, information hacking and corruption.
37 / 50
The act of having an understanding of crime distribution and information about the demography is known as
38 / 50
Basically, any intentional and unintentional criminal actions are
39 / 50
Climatic hazards basically include hurricane, flood and
40 / 50
Thunderstorm is an example________threat
41 / 50
Traditionally, the state is the custodian and ultimate beneficiary of the monopoly use of violence as advocated by
42 / 50
These tools above are effective tools for applications in crime prevention and
43 / 50
Adamsite (DM) is a chemical agent used as
44 / 50
The progressive destruction and less capable of sustaining vegetation is_________
45 / 50
The quality of the decision we make after our automated analysis largely determine the amount of success we record in the course of our
46 / 50
With the experience from the september 11 terrorist attck in the USA, most countries have fortified their airports with______
47 / 50
what involves safety against HIV-AIDS pandemicsis__________
48 / 50
The capacity of any human and non-human elements to destroy the vital interests of others considered as targets is _____
49 / 50
the use of poisonous gases on any targeted persons and ecosystem is
50 / 50
A threat that takes place on the road, streets, or even bridges is
Restart quiz
Rate this quiz