Category: CSS241 0 CSS241 1 / 149 ______ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence Pastoral fulani Area Fulani Cattle fulani Settled fulani 2 / 149 usually involvos submerging of land by overflowing water Check 3 / 149 Threats which can damage infrastructure basically include the following except___ ___ terrorism Natural disaster all of the above sabotage 4 / 149 threats are persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset Check 5 / 149 believes that crimes control can be carried out through the application of large pin maps to illustrate the area where crimes occurred Check 6 / 149 During the westphalia period the treat security usually involved____ ____ tate of aggression state of state aggression state agression aggression 7 / 149 Nigeria has continued to pose a huge_______risk to the country security module rising ethnic threat 8 / 149 ________ can be defined as a means of protecting information systems from any illegitimate access and uses, theft, amendment or malicious attack information security physical security system security external security 9 / 149 _____ is a good tool in information supping which are used by both criminals and law enforcement agents Sex and food Food and drinks Milk and honet Sex and honey 10 / 149 ___ ____ can be defined as a means of protecting information systems from any illegitimate access and uses, theft, amendment or malicious attack system security physical security information security external security 11 / 149 During the westphalia period the treat security usually involves Check 12 / 149 can be described as a tool designed to find previously unknown knowledge through links, associations, and patterns in data Check 13 / 149 Approaches to Public Relation Management in security sectors are the following except one Direct Communication Taking to Audience Audience Targeting Spin , 14 / 149 are support personnel who assist the spies in managing their clandestine communication by securiting them against energy’s interception or detection Check 15 / 149 Nigeria has continued to pose a huge _risk to the country Check 16 / 149 can be described as the act of seizing and forcefully taking possession of the victim’s vehicle by the crime offender through the use of dangerous weapons especially gun Check 17 / 149 Hurricane entail sea surface temperatures of at least Check 18 / 149 War gaming is a Check 19 / 149 s a refined, analysed and evaluated information data gathered through either over (open) or clandestine (secret) means or both Check 20 / 149 Research finding has shown that couples that both provide ___ ___to the family on equal terms experience less incidence of violence resources violence External factors Alcohol 21 / 149 Anti virus software was performed by___ John Lord 1996 Arnold Woods in 1984 Bernt Fix in 1987 Chris Fox in 1982 22 / 149 False _____ errors are those errors that bother on the possibility of wrongfully labelling an innocent person as a crime suspect/criminal due to mistakes in the result of our automated data analysis. negative anti-social Social Democratic positivism positive 23 / 149 Which tool is used to prevent any strange or unintended person from comprehending the content of a message Check 24 / 149 is the act of watching or observing people or objects Check 25 / 149 Terrorism trod its semantic pathway to the English usage in_______ 1795 1793 1795 1794 26 / 149 Choose the one that does not belong to the type of training Intro training On the Job training Off the Job training External training , 27 / 149 The process of gathering and assembling information through several methods for the purpose of production intelligence is Check 28 / 149 __________ is the collection of intelligence through the use of satellite images Signal intelligence (SIGNIT) Imagery intelligence Open course intelligence Human intelligence 29 / 149 Nigeria has continued to pose a huge _risk to the country Check 30 / 149 is usually involves submerging of land by overflowing water Check 31 / 149 ___ is a process of gathering and assembling information through several methods for the purpose of production intelligence Intelligence information Intelligence data Intelligence analyses Intelligence collection. 32 / 149 Simulation helps to reduce the situation of crisis in patients as stressed by (2004) Check 33 / 149 are spies used in espionage intelligence collection Check 34 / 149 s usually involves submerging of land by overflowing water Check 35 / 149 ____ are device that can secretly hide information or things, they look like ordinary object concealment Devices Cryptography Biometric Diversion safe 36 / 149 _______ is the consequence of a natural hazard conflict all of the above natural disaster dispose 37 / 149 Thomas Hobbes (1962) argued that the essence of a state is to guarantee the ___ ___ property and ensure law security of materials security of good security of lives security of loan 38 / 149 One of the causes of job stress is Check 39 / 149 Data-mining and are very important tools of security threat management as well as intelligence collection and analysis Check 40 / 149 General (GAS) describes the stages an individual encounters in stressful conditions Check 41 / 149 Military simulation is also known as_________ extertion extortion insurgency war gaming 42 / 149 The actions targeted towards the wrong or improper use of another person are known as Rape Coatis Abuse Homicide 43 / 149 is a process of gathering and assembling information through several methods for the purpose of production intelligence Check 44 / 149 The following are causes of job stress except Regular duty Long hours. Shift work Role Conflict 45 / 149 Both theories believe that high birth rate is the major source of violence or war but their views are slightly different from each othe Malthusian theory and Hobbesian theory Historical theory and methusian theory Hobbesian theory and Rousseanen theory Youth bulge theory and Malthusian theory 46 / 149 Affiliation and religion have become fundamental elements of post Nigeria Check 47 / 149 Nigeria has continued to pose a huge _risk to the country Check 48 / 149 The word security emanated from the Greek word se-curari meaning ___ ___ state of authority State of no fear state of freedom state of being free 49 / 149 War gaming is a ___ ___ System simulation virtual simulation health care simulation Constructive simulation 50 / 149 __________ simulation usually involves a process whereby simulated people use simulated tools in a simulated world. Military Constructive combined construction 51 / 149 An earthquake can be said to have__ 6 points three points one point two points 52 / 149 architecture is also a very viable approach to computer and information security. Check 53 / 149 believes that the best way through which we can control crime is to examine the nature of the crime the conditions that produces such crimes as well as the impact of the crimes Check 54 / 149 The approaches of securities are________ software, security system security design, security architecture, secure hardware desktop publishing, microsoft, microsoft word powerpoint, secure hard disk, outlook 55 / 149 Earthquakes are recorded with ___ r seismometer barometer speedometer thermometer 56 / 149 ___ ____ is usually involves submerging of land by overflowing water typhoon diameter volcanic flood 57 / 149 Karl marx is one of the proponents of the youth bulge theory TRUE All of the above NOT SURE FALSE 58 / 149 information warfare as “struggles for control over information activities”. TRUE FALSE NOT SURE All of the above 59 / 149 Approaches to Public Relation Management in security sectors are the following except one. Audience Targeting Spin , Direct Communication Taking to Audience 60 / 149 Simulation helps to reduce the situation of crisis in patients as stressed by (2004) Check 61 / 149 Idealism, Pluralism and Realism are some of approaches of Check 62 / 149 _______ is the crime of seizing property through violence or intimidation theft hijack violence robbery 63 / 149 After car jacking, one should seek Check 64 / 149 usually, involves collecting, analyzing, evaluating and dissemination information that can protect a nation against internal threats. Check 65 / 149 crisis in North Nigerian states where some antiWestern education Muslim fanatics engaged security agents in bloody battle is called ___ ___ sharia group Boko-Haram al majir islamic jama 66 / 149 The following are the proponent s of the youth bulge theory except one Garry Fuller Gunnar Heinsohn Jack Gold stone Nission Omular 67 / 149 The following account for the causes of domestic violence except one Resources social learning Hard drugs Affection 68 / 149 War gaming is a Check 69 / 149 usually involvos submerging of land by overflowing water Check 70 / 149 Idealism; meaning ___ the ability to guarantee security idealist approach in preventing the outbreak of world war II way to reduce use of force or violence initiative to guarantee world peace and security 71 / 149 The following are the forms of violence crimes except pick the incorrect options Check 72 / 149 Affiliation and religion have become fundamental elements of post Nigeria Check 73 / 149 After robbery, you should call the Check 74 / 149 Wa ever (1995) associates the concept of Check 75 / 149 believes that crimes control can be carried out through the application of large pin maps to illustrate the area where crimes occurred Check 76 / 149 The following are the forms of violence crimes except ____ ____ pick the incorrect options Cruelty to animals Assault and battery Abuse property protection 77 / 149 ____ are spies used in espionage intelligence collection all of the above commission principal , agent , 78 / 149 Non traditional security threats includes one international hostilities corruption Drug trafficking HIV- AIDS 79 / 149 lack of has really undermined the capacity of the police to perform its functions Check 80 / 149 threats are persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset Check 81 / 149 An earthquake is also known as___ crust tremor rupture crust 82 / 149 Individual can carry out a just violence if the Government is Repressive To meet the yearnings of the people No respect for natural rights All of the above 83 / 149 Job design is a principle of management Check 84 / 149 Avoid looking at the robbers on the face so as to avoid the issue of threat of Check 85 / 149 These are the variety of international relations theory of violence except one Power transition theory ObaCyclical theory of war Peace and war theory Political realism , 86 / 149 The following are the proponent s of the youth bulge theory except one Garry Fuller Nission Omular Jack Gold stone , Gunnar Heinsohn , 87 / 149 Data mining can also be described as the process of patterns from data Check 88 / 149 is the form of violence crime in which a person carries out violence against another person within the same household? Domestic violence Murder Homicide Rape 89 / 149 s a type of tropical cyclone which is a generic term for a low pressure system that generally forms in the tropics Check 90 / 149 something which simulates a system or environment in order to predict actual behaviour Check 91 / 149 An earthquake is also known as Check 92 / 149 Research finding has shown that couples that both provide to the family on equal terms experience less incidence of Check 93 / 149 Affiliation and religion have become fundamental elements of post ____ Nigeria religion mandate relations colonial 94 / 149 Intelligence personnel, Government institutions, Mass Media, communication technology e. t.(c) are Check 95 / 149 An earthquake can be said to have points Check 96 / 149 querries involve conducting our investigation by moving from unknown to known Check 97 / 149 Thomas Hobbes (1962) who argued that the essence of a state is to guarantee the ___ ___ property and ensure law security of materials security of loan security of goods security of lives 98 / 149 ____ ____is the form of violence crime in which a person carries out violence against another person within the same household? Murder Homicide Rape Domestic violence 99 / 149 Data mining uses a tool that makes use of automated analysis techniques Check 100 / 149 is a methods which involves one secretly listening to a private conversation or discussion Check 101 / 149 terrorism is a ________ term. pejorative perogative normative none of the above 102 / 149 something which simulates a system or environment in order to predict actual behaviour Check 103 / 149 The following are the forms of violence crimes except pick the incorrect options Check 104 / 149 usually, involves collecting, analyzing, evaluating and dissemination information that can protect a nation against internal threats. Check 105 / 149 Hurricane entails sea surface temperatures of at least ___ ____ 220c (600f) 420c (800f) 230c (900f) 260c (800f) 106 / 149 The methods of including suggestibility, Reid, Deception and torture Check 107 / 149 Anti-Virus designed purposely to identify _________ viruses details information datas 108 / 149 Identify one that is not the theory of violence below Peter theory Marxist theory The mathusian theory Hobbesian theory 109 / 149 Microkenel can be described as a computer kernel that enables relevant Check 110 / 149 _____ is a good tool in information supping which are used by both criminals and law enforcement agents Milk and honet Sex and honey Food and drinks Sex and food 111 / 149 usually involves submerging of land by overflowing water Check 112 / 149 Anti-Virus was designed purposely to identify ___ datas Virus details information 113 / 149 Marxist theory is one of the theories of crime control. FALSE TRUE NOT SURE All of the above 114 / 149 __ has become alternative route through which people can meet their needs? Achievement Ascribe status crime Role 115 / 149 usually, involves collecting, analyzing, evaluating and dissemination information that can protect a nation against internal threats. Check 116 / 149 Choose the one that does not belong to the type of trainings External training , Intro training On the Job training , Off the Job training 117 / 149 Sudden motion in earth caused by abrupt release of slowly accumulated Check 118 / 149 The situation of domestic violence is rampant among the families where one of the partners indulges in very high consumption of ___ ___ Ice cream Alcohol Coffee Juice 119 / 149 ___ is a type of tropical cyclone which is a generic term for a low pressure system that generally forms in the tropics earth tornadoe lava hurricane 120 / 149 __________ Simulation affords health care providers an opportunity to examine their capacity to respond to emergency situations. Hospital All of the above Medical Health Care 121 / 149 is a methods which involves one secretly listening to a private conversation or discussio Check 122 / 149 The approaches of securities are___ ___ ___ powerpoint, secure hard disk, outlook desktop publishing, microsoft, microsoft word software, security system security design, security architecture, secure hardware 123 / 149 The methods of interrogation includes the following except one .Pick the odd one Murder Deception Reid Future 124 / 149 Which tool is used to prevent any strange or unintended person from comprehending the content of a message Check 125 / 149 s the indent consequence of communication breakdown in the cycle of domestic violence Peace building phase Honey Building phase Acting out phase Tension building phase 126 / 149 Affiliation and religion have become fundamental elements of post Nigeria Check 127 / 149 The following are the forms of violence crimes except ______ pick the incorrect options Cruelty to animals , property protection Abuse , Assault and battery 128 / 149 is a process of gathering and assembling information through several methods for the purpose of production intelligence Check 129 / 149 It is very important to install system, Check 130 / 149 Job design is a principle of management. Check 131 / 149 According to ___________ (2004) simulation helps to reduce the situation of crisis in patients McKnight williams cole Eder-van Hook paul and patrick brantingham 132 / 149 Simulation helps to reduce the situation of crisis in patients as stressed by (2004) Check 133 / 149 Identify the one that is not types of security peace security food security economic security Health security 134 / 149 The concept of security has undergone a transition from conceptualization to a nontraditional meaning. Check 135 / 149 ________ is usually involves submerging of land by overflowing water typhoon volcanic diameter flood 136 / 149 Microkenel can be described as a computer kernel that enables relevant Check 137 / 149 Earthquakes are recorded with Check 138 / 149 The school of thought in theories of violence are the following except one Rationalist theory Historical theory Political science theory Geographical theories 139 / 149 The word security emanated from the Greek word se-curari meaning Check 140 / 149 ___ ____ are persons, things, events or ideas, which pose accidentally or deliberately some degree or danger to an asset security encounter security security threats security demands 141 / 149 The following are the forms of violence crimes except pick the incorrect options Check 142 / 149 Another safety tip is to have a comprehensive for your vehicle. Check 143 / 149 ___________ is also known as war-gaming. Military simulation civilian simulation political simul;ation police simulation 144 / 149 ____ ___ can be described as that aspect of security designed purposely to provide protection for specific purposely to provide protection for specific infrastructure particularly those infrastructure considered critical domain security infrastructure security economic security food security 145 / 149 ___ something which simulates a system or environment in order to predict actual behaviour simulation collection simulate spyware 146 / 149 usually, involves collecting, analyzing, evaluating and dissemination information that can protect a nation against internal threats. Check 147 / 149 _____ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence Area Fulani Pastoral fulani Settled fulani Cattle fulani 148 / 149 The following are the theories of crime control except one Popularity theory Realism Environmentalist theory Marxist theory 149 / 149 ___ ___ is a place that involves an aspect of transportation seaport security airport security environment security health security Restart quiz Rate this quiz Send feedback