CSS244



Category: CSS244

0

ATTENTION:

Kindly note that you will be presented with 50 questions randomized from the NOUN question bank. Make sure to take the quiz multiple times so you can get familiar with the questions and answers, as new questions are randomized in each attempt.

Good luck!


CSS244

1 / 50

1.

The end of the cold war in
has widened the scope of
security studies

2 / 50

2.

In international airports ,it is
illegal for restaurant
operators to use plates
which terrorists may
convert to______

3 / 50

3.

An organised rebellion is
aimed at over throwing a
constituted
through the use of
subversion and armed
conflict

4 / 50

4.

Another word for "tsunami"
is _______

5 / 50

5.

The use of crime mapping
through installation of
security gadgets like
CCTV's and secret
camera's are helpful to
identify

6 / 50

6.

During the Westphalia
period, the major threat to
the political sovereignty of
any State usually emanated
from ____State

7 / 50

7.

The anti-colonial armed
struggle between the
imperial forces of portugal
and
mozambique[FRELIMO]
was in _______

8 / 50

8.

The transportation of a
woman against her will for
ransom is labelled

9 / 50

9.

The terrorist attacks into the
world trade center was
linked to_________

10 / 50

10.

With the experience from
the september 11 terrorist
attck in the USA, most
countries have fortified their
airports with______

11 / 50

11.

Hurricane is an example
of_____threat

12 / 50

12.

Piracy usually involves a
very violent act perpetrated
by private parties of no
affiliation

13 / 50

13.

The climatic change and
environment pollution in
Africa has increased
_________

14 / 50

14.

Link analysis is very
popular among
practitioners

15 / 50

15.

Another name for
Knowledge Discovery in
Database (KDD) is

16 / 50

16.

is very helpful to unravel
secrets in organised crimes
like terrorism,
assassination, armed
robbery and electoral
practices.

17 / 50

17.

A threat where the
offenders use deadly
weapons in the course of
carrying out their dastardly
act is called

18 / 50

18.

1. According to ______the
State is the custodian and
ultimate beneficiary of the
monopoly use of violence

19 / 50

19.

Security threat can be
described as a capacity to
destroy the vital interests of
other considered as

20 / 50

20.

Among the
Greeks,earthquake is said
to be caused
by____________

21 / 50

21.

The transportation of a
person against the person's
will, usually to hold the
person with illegal authority
for ransom is

22 / 50

22.

In Engineering , risk is
defined as the pobabilityof
an accident times
______per accident

23 / 50

23.

Before the advent of
internet ,computer virus
were usually spread
through __________

24 / 50

24.

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

25 / 50

25.

Chloroacetophenone (CN)
is a chemical agent used
for

26 / 50

26.

One of the basic manmade
security threats is _____

27 / 50

27.

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

28 / 50

28.

History has shown that the
first public virus removal
task was performed
in________

29 / 50

29.

Rapid rate of
industrialisation is one of
the factors responsible for
the problem of
___________in
communities

30 / 50

30.

During these periods in
pirates caught were
paraded before the public
and later subject to
execution.

31 / 50

31.

Basically, any intentional
and unintentional criminal
actions are 

32 / 50

32.

The threat which involve
the malicious activities of
man is known as

33 / 50

33.

Terrorism is coined from the
word_____

34 / 50

34.

The process of wrongfully
labelling an innocent
person as a criminal due to
mistakes is the result of our
automated data analysis is
called

35 / 50

35.

Thunderstorm is an
example________threat

36 / 50

36.

When contaminations
cannot be processed and
neutralised by environment
we experienced _______
pollution

37 / 50

37.

Etymologically,the word
"tsunami" emanate from
the______ language

38 / 50

38.

Another name for
earthquake
is____________

39 / 50

39.

The end of the Cold War in
____ has widened the
scope of security

40 / 50

40.

This is one of the forms of
terrorism________

41 / 50

41.

A hurricane is a type of
tropical ____________

42 / 50

42.

The factors responsible for
the various pollutions that
generate environmental
hazards is________

43 / 50

43.

It is a fact that food security
is not luxury but_______

44 / 50

44.

A threat that takes place on
the road, streets, or even
bridges is

45 / 50

45.

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

46 / 50

46.

Piracy is a violent crime
and robbery which takes
place on the

47 / 50

47.

Etymologically, the word
Assassin emanated from
the Arabic word

48 / 50

48.

The measures that ensure
every individual entitlement
to employment and living
wage is_________

49 / 50

49.

Climatic hazards basically
include hurricane, flood and

50 / 50

50.

According to ______ civil
security includes a better
interdepartmental
coordination

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link