CSS245



Category: CSS245

0

CSS245

1 / 70

1.

The relationship between
the employer and the
employee becomes

2 / 70

2.

The public security is
invariably a

3 / 70

3.

The formulation of security
policy is the sole
responsibility of
management at ________

4 / 70

4.

The state or circumstatnces
or place not providing good
protection or not free from
danger is called

5 / 70

5.

The process by which
individuals assess
information from the
environment, organise it
and make meaning of it is

6 / 70

6.

Perception is the process in
the problem of security
industry where individuals
assess _____

7 / 70

7.

All appliances must be
properly switched off before
leaving the establishment is
_______

8 / 70

8.

Aberdeen patrol system is a
patrol where there is
______

9 / 70

9.

The develop forecasts in
planning process is aimed
at_____

10 / 70

10.

The qualities of industrial
security manager includes
______

11 / 70

11.

The evaluation of protection
programme is associated
with loss and
analysis.

12 / 70

12.

The triangular theory of
industrial loss is
symbolically thus ______

13 / 70

13.

Uniforms, Cap, Badge, or
other identification marks to
be must be approved by the
minister of internal affairs
before _______ be in
operation

14 / 70

14.

The constitutional body
responsible for advising the
president on matters
relating to public security is

15 / 70

15.

Public security refers to
security as ______

16 / 70

16.

Security survey is aimed at
_______

17 / 70

17.

______ is the government
arrangement for the
protection of lives and
property

18 / 70

18.

Endeavour not to spray
your money at public
functions such marriages,
etc is _______

19 / 70

19.

In modern applications,
security hardware is often
combined with

20 / 70

20.

Causes of industrial loss
include __

21 / 70

21.

The modern security
hardware which is remotely
controlled by an intrusion
alarm is

22 / 70

22.

The private security firms
are private companies
required by law to be
registered with _____

23 / 70

23.

The act of watching,
protecting a facility by
moving continually around
is

24 / 70

24.

The limit and extents of
powers to be conferred on
security managers,
supervisors, etc entails
_______

25 / 70

25.

The security that is privately
owned and managed is
called

26 / 70

26.

There are
types of records in security
practice

27 / 70

27.

Dearth of modern
equipment, technology and
methods is the problem of
___________

28 / 70

28.

To protect lives' are the sole
responsibility of
management at board level
to formulate

29 / 70

29.

The process of security
planning involves the
establishment of _____

30 / 70

30.

Electronic devices
constitute the fastest
growing category of
security

31 / 70

31.

Any person may be
ineligible to own security
guards company in Nigeria
if ______

32 / 70

32.

The decree that was
enacted by the government
to regulate private guards
operators is ______

33 / 70

33.

Security agencies in Nigeria
include _____

34 / 70

34.

is the primary mode of
production during the
industrial revolution.

35 / 70

35.

The technological
innovations were the main
factors of the industrial
revolution in Great Britain
and ___________

36 / 70

36.

The functions of the Nigeria
police council
include_______

37 / 70

37.

The private guards
companies decree no 33 of
was enacted to safeguard
the conducts of private
operators.

38 / 70

38.

The prevention and
detection of crime and the
apprehension of an
offender is the sole duty of

39 / 70

39.

Fighting do occur because
of poor communication
between the security, staff
and
at the guard - post

40 / 70

40.

An incorporated company
as an artificial person in the
eye of the law, is entitled to

41 / 70

41.

______ is one of the
proforma schedule of duty
for security staff

42 / 70

42.

The duties of the Nigeria
police include the ______

43 / 70

43.

The demand for
identification card for
anybody claiming to be
from water works is a hint
on

44 / 70

44.

The Nigeria police council
comprises one of the
following _____

45 / 70

45.

To have a visitor's access
control, guard post at every
access point is very
important to check their
entry and

46 / 70

46.

The subject matter of ethics
is concerned with what is
right or

47 / 70

47.

The act of performing the
services of watching,
guarding, patrolling or
carrying of money is the
sole duty of

48 / 70

48.

When an environment
induces actions or events
that can result in losses to
the company it is called

49 / 70

49.

Example of unsafe
conditions in industrial loss
is______

50 / 70

50.

The protection and
preservation of lives and
property against wastage in
a premises is called

51 / 70

51.

Professional security
practitioners must not only
be people of integrity they
must also be seen to be so
it is a ________

52 / 70

52.

The police service
commission is responsible
for ______

53 / 70

53.

A system where the
security operative is
detailed to patrol along a
given route is known as

54 / 70

54.

The private security is
characterised by

55 / 70

55.

The Nigeria police force is a
public institution
established by the Act CAP
of _____

56 / 70

56.

A process of establishing
objectives, allocating
resources within prescibed
budgeting limitations is

57 / 70

57.

The electronic system
which enunciated at the
security duty room from
where a designated
response force is
dispatched is

58 / 70

58.

The security survey report
tries to reveal the areas of
______

59 / 70

59.

The public sector security is
an agency of the

60 / 70

60.

This is one of the features
of security planning _____

61 / 70

61.

The persons associated
with economic gains and
profits are known as

62 / 70

62.

and timely account of
events provides both hind
sight and forsight to
security management

63 / 70

63.

The private security firms
are private companies
required by law to be
registered with

64 / 70

64.

The protection of company
assets from fire, fraud,
damage and trepass is the
role of ____

65 / 70

65.

The unnecessary
exposures to risk - bearing
are the suffering harm or
losses and
of protection programmes

66 / 70

66.

The attribute of Ethics is
_________

67 / 70

67.

The craftworker assumed
the role of

68 / 70

68.

The effective control and
the monitor of movements
of both visitors and internal
staff requires

69 / 70

69.

The method to control any
activity carried out and to
prevent any violation of the
policy is

70 / 70

70.

The records in security
practice used for record
keeping or to issue out
instructions are called

Rate this quiz



 

Hello NOUNITES! Join other NOUNITES on Whatsapp and Telegram below, EXCLUSIVE UPDATES awaits you from various study centres and happenings in NOUN. Stay updated
 
Don't miss out, JOIN OVER 22,000 other students already following our platforms

FOLLOW WHATSAPP CHANNEL  FOLLOW TELEGRAM CHANNEL 
    
JOIN WHATSAPP GROUP   JOIN TELEGRAM GROUP
close-link