CSS244



Category: CSS244

0

CSS244

1 / 70

1.

In physical security,-is
installed for surveillance
and notification_________

2 / 70

2.

Piracy is a violent crime
and robbery which takes
place on the

3 / 70

3.

History has shown that the
first public virus removal
was performed by____

4 / 70

4.

If there is no provision of
sufficient security at the
seaport,this causes
_______in that country

5 / 70

5. The Italian word for workto-rule strike is

6 / 70

6.

Another name for
demonstration is

7 / 70

7.

Climatic hazards basically
include hurricane, flood and

8 / 70

8.

Terrorism is coined from the
word_____

9 / 70

9.

Violent criminal behaviors
designed primarily to
generate fear in the
community for political
purposes is

10 / 70

10.

Another word for "tsunami"
is _______

11 / 70

11.

Another name for
earthquake
is____________

12 / 70

12.

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

13 / 70

13.

The climatic forms of
security threats have
impact not only on man but
on _______

14 / 70

14.

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

15 / 70

15.

A threat where the
offenders use deadly
weapons in the course of
carrying out their dastardly
act is called

16 / 70

16.

The measures that ensure
every individual entitlement
to employment and living
wage is_________

17 / 70

17.

According to ______ civil
security includes a better
interdepartmental
coordination

18 / 70

18.

The progressive destruction
and less capable of
sustaining vegetation
is_________

19 / 70

19.

The anti-colonial armed
struggle between the
imperial forces of portugal
and
mozambique[FRELIMO]
was in _______

20 / 70

20.

One vital element of the
subject based query is

21 / 70

21.

Tsunami is usually mounted
by some geological
conditions like_______

22 / 70

22.

Link analysis is very
popular among
practitioners

23 / 70

23.

The god of earthquake in
Greek mythology
is____________

24 / 70

24.

Piracy in the 17th and 18th
centuries attracted
penalty against the
offenders

25 / 70

25.

Due to the Revolution in
modern technology some
computers demandinformation before an
access is______

26 / 70

26.

who defines terrorism as a
method whereby an
organised groups seeks to
achieve its avowed aims
through
violence__________

27 / 70

27.

The word terrorism was
popularised by the jacobins
who ruled____________

28 / 70

28.

0ne of the two issues that
determine the existence of
risk is the _______

29 / 70

29.

what is the measures used
to provide physical
protecton of resourses
against deliberate and
accidental threats_______

30 / 70

30.

The threat which involves
entrapment of the
environment with various
forms of pollution is

31 / 70

31.

Etymologically, the word
Assassin emanated from
the Arabic word

32 / 70

32.

is the process of analysing
data from different
perspectives and
summarising it into useful
information.

33 / 70

33.

The emergence of the Cold
War in____, the main
challenge against state has
been internal threat to
security

34 / 70

34.

Seaports are major
shipping places that are
vulnerable to security
_________

35 / 70

35.

According to DeRosa, the
process which involves
transforming the data to
make them useful is known
as

36 / 70

36.

s essential to tactical
analysis necessary for
crime forecasting and
geographic profiling

37 / 70

37.

is often applied at various
levels of law enforcement in
any community to know the
situations of crime and
ways to reduce it

38 / 70

38.

Element of preparedness in
civil security approaches
includes________

39 / 70

39.

The period in which threat
to security usually involved
state to state aggression is

40 / 70

40.

Among the
Greeks,earthquake is said
to be caused
by____________

41 / 70

41.

what involves safety
against HIV-AIDS
pandemicsis__________

42 / 70

42.

computer security provides
a platform which enhance
quality attributes like_____

43 / 70

43.

The end of the cold war in
has widened the scope of
security studies

44 / 70

44.

Infrastucture security is
designed to provide
protection for critical
infrastructures such as
__________

45 / 70

45.

0ne type of the anti-virus
softwares in the market
today is_______

46 / 70

46.

Terrorism is a ______
threat

47 / 70

47.

involves conducting our
investigation by moving
from unknown to known

48 / 70

48.

The central focus of
computer security is the
techniques that enhance
the correct________

49 / 70

49.

One of the effects of
Environmental pollution is
________

50 / 70

50.

When contaminations
cannot be processed and
neutralised by environment
we experienced _______
pollution

51 / 70

51.

Insurgency is a form of
security threat

52 / 70

52.

The threat which includes
flood and cyclone is

53 / 70

53.

The qualitative risk analysis
is the effort to determine
the ______probability

54 / 70

54.

Terrorism became a regular
vocabulary in the
year______

55 / 70

55.

s the direct application that
comes form considering the
inherent geography in crime

56 / 70

56.

The internal or external
threat that challenges the
authority of the state is
_________

57 / 70

57.

One of the various
approaches which involves
a network of activities is
________

58 / 70

58.

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

59 / 70

59.

is the tool to probe further
as a search light to what
may constitute an act of
criminality

60 / 70

60.

A criminal act that relate to
illegal acquisition of another
person's property is called

61 / 70

61.

Piracy usually involves a
very violent act perpetrated
by private parties of no
affiliation

62 / 70

62.

Thunderstorm is an
example________threat

63 / 70

63.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

64 / 70

64.

The transportation of a
woman against her will for
ransom is labelled

65 / 70

65.

In Nigeria, where the
number of police personnel
is very inadequate to
provide any meaningful
security calls for

66 / 70

66.

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

67 / 70

67.

enables security
practitioners to put
observable crime data to
scientific testing through the
processes of data collation,
analysis and interpretation

68 / 70

68.

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

69 / 70

69.

The type of demonstration
that can lead to the
breakdown of law and order
is

70 / 70

70.

The process of wrongfully
labelling an innocent
person as a criminal due to
mistakes is the result of our
automated data analysis is
called

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link