CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

is a subfield in criminology
and security studies

2 / 50

2.

s essential to tactical
analysis necessary for
crime forecasting and
geographic profiling

3 / 50

3.

s a method through which
we analyse crime

4 / 50

4.

A threat where the
offenders use deadly
weapons in the course of
carrying out their dastardly
act is called

5 / 50

5.

The factors chiefly
responsible for various
environmental pollutions
are

6 / 50

6.

The anti-colonial armed
struggle between the
imperial forces of portugal
and
mozambique[FRELIMO]
was in _______

7 / 50

7.

what is the measures used
to provide physical
protecton of resourses
against deliberate and
accidental threats_______

8 / 50

8.

Another name for sick-out
strike is

9 / 50

9.

The factors responsible for
the various pollutions that
generate environmental
hazards is________

10 / 50

10.

Another word for "tsunami"
is _______

11 / 50

11.

The god of earthquake in
Greek mythology
is____________

12 / 50

12.

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

13 / 50

13.

The internal or external
threat that challenges the
authority of the state is
_________

14 / 50

14.

The threat which includes
flood and cyclone is

15 / 50

15.

The process by which an
organisation protects and
secure its system
is_________

16 / 50

16.

Element of preparedness in
civil security approaches
includes________

17 / 50

17.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

18 / 50

18.

The process of wrongfully
labelling an innocent
person as a criminal due to
mistakes is the result of our
automated data analysis is
called

19 / 50

19.

The type of demonstration
that can lead to the
breakdown of law and order
is

20 / 50

20.

climatic hazards are
created by factors such as
_________

21 / 50

21.

The use of crime mapping
through installation of
security gadgets like
CCTV's and secret
camera's are helpful to
identify

22 / 50

22.

The measures and actions
taken by a company to
protects its corporate image
and establish regulations
is_______

23 / 50

23.

The end of the Cold War in
____ has widened the
scope of security

24 / 50

24.

History has shown that the
first public virus removal
was performed by____

25 / 50

25.

is very helpful to unravel
secrets in organised crimes
like terrorism,
assassination, armed
robbery and electoral
practices.

26 / 50

26.

According to ______ civil
security includes a better
interdepartmental
coordination

27 / 50

27.

Preparedness is the key
element of civil security
which has the view
to_____violence

28 / 50

28.

The transportation of a
person against the person's
will, usually to hold the
person with illegal authority
for ransom is

29 / 50

29.

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

30 / 50

30.

Terrorism is a ferocious use
of violence, a form of

31 / 50

31.

is often applied at various
levels of law enforcement in
any community to know the
situations of crime and
ways to reduce it

32 / 50

32.

enables security
practitioners to put
observable crime data to
scientific testing through the
processes of data collation,
analysis and interpretation

33 / 50

33.

The process through which
we use computer to
develop a large database is
known as

34 / 50

34.

The civil security which has
adequate knowledge of
incidence of risk through
the process of risk
education is ______

35 / 50

35.

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

36 / 50

36.

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

37 / 50

37.

The act of having an
understanding of crime
distribution and information
about the demography is
known as

38 / 50

38.

Basically, any intentional
and unintentional criminal
actions are 

39 / 50

39.

Climatic hazards basically
include hurricane, flood and

40 / 50

40.

Thunderstorm is an
example________threat

41 / 50

41.

Traditionally, the state is the
custodian and ultimate
beneficiary of the monopoly
use of violence as
advocated by

42 / 50

42.

These tools above are
effective tools for
applications in crime
prevention and

43 / 50

43.

Adamsite (DM) is a
chemical agent used as

44 / 50

44.

The progressive destruction
and less capable of
sustaining vegetation
is_________

45 / 50

45.

The quality of the decision
we make after our
automated analysis largely
determine the amount of
success we record in the
course of our

46 / 50

46.

With the experience from
the september 11 terrorist
attck in the USA, most
countries have fortified their
airports with______

47 / 50

47.

what involves safety
against HIV-AIDS
pandemicsis__________

48 / 50

48.

The capacity of any human
and non-human elements
to destroy the vital interests
of others considered as
targets is _____

49 / 50

49.

the use of poisonous gases
on any targeted persons
and ecosystem is

50 / 50

50.

A threat that takes place on
the road, streets, or even
bridges is

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link