Loading...



Category: CSS241

0

CSS241

1 / 149

______ involves putting
questions to persons with
the aim of getting
information which can help,
which can aid intelligence

2 / 149

usually involvos
submerging of land by
overflowing water

3 / 149

Threats which can damage
infrastructure basically
include the following
except___ ___

4 / 149

threats are persons, things,
events or ideas, which pose
accidentally or deliberately
some degree or danger to
an asset

5 / 149

believes that crimes control
can be carried out through
the application of large pin
maps to illustrate the area
where crimes occurred

6 / 149

During the westphalia
period the treat security
usually involved____ ____

7 / 149

Nigeria has continued to
pose a huge_______risk to
the country

8 / 149

________ can be defined
as a means of protecting
information systems from
any illegitimate access and
uses, theft, amendment or
malicious attack

9 / 149

_____ is a good tool in
information supping which
are used by both criminals
and law enforcement
agents

10 / 149

___ ____ can be defined as
a means of protecting
information systems from
any illegitimate access and
uses, theft, amendment or
malicious attack

11 / 149

During the westphalia
period the treat security
usually involves

12 / 149

can be described as a tool
designed to find previously
unknown knowledge
through links, associations,
and patterns in data

13 / 149

Approaches to Public
Relation Management in
security sectors are the
following except one

14 / 149

are support personnel who
assist the spies in
managing their clandestine
communication by
securiting them against
energy’s interception or
detection

15 / 149

Nigeria has continued to
pose a huge
_risk to the country

16 / 149

can be described as the act
of seizing and forcefully
taking possession of the
victim’s vehicle by the crime
offender through the use of
dangerous weapons
especially gun

17 / 149

Hurricane entail sea
surface temperatures of at
least

18 / 149

War gaming is a

19 / 149

s a refined, analysed and
evaluated information data
gathered through either
over (open) or clandestine
(secret) means or both

20 / 149

Research finding has
shown that couples that
both provide ___ ___to the
family on equal terms
experience less incidence
of violence

21 / 149

Anti virus software was
performed by___

22 / 149

False _____ errors are
those errors that bother on
the possibility of wrongfully
labelling an innocent
person as a crime
suspect/criminal due to
mistakes in the result of our
automated data analysis.

23 / 149

Which tool is used to
prevent any strange or
unintended person from
comprehending the content
of a message

24 / 149

is the act of watching or
observing people or objects

25 / 149

Terrorism trod its semantic
pathway to the English
usage in_______

26 / 149

Choose the one that does
not belong to the type of
training

27 / 149

The process of gathering
and assembling information
through several methods
for the purpose of
production intelligence is

28 / 149

__________ is the
collection of intelligence
through the use of satellite
images

29 / 149

Nigeria has continued to
pose a huge
_risk to the country

30 / 149

is usually involves
submerging of land by
overflowing water

31 / 149

___ is a process of
gathering and assembling
information through several
methods for the purpose of
production intelligence

32 / 149

Simulation helps to reduce
the situation of crisis in
patients as stressed by
(2004)

33 / 149

are spies used in
espionage intelligence
collection

34 / 149

s usually involves
submerging of land by
overflowing water

35 / 149

____ are device that can
secretly hide information or
things, they look like
ordinary object

36 / 149

_______ is the
consequence of a natural
hazard

37 / 149

Thomas Hobbes (1962)
argued that the essence of
a state is to guarantee the
___ ___ property and
ensure law

38 / 149

One of the causes of job
stress is

39 / 149

Data-mining and
are very important tools of
security threat management
as well as intelligence
collection and analysis

40 / 149

General
(GAS) describes the stages
an individual encounters in
stressful conditions

41 / 149

Military simulation is also
known as_________

42 / 149

The actions targeted
towards the wrong or
improper use of another
person are known as

43 / 149

is a process of gathering
and assembling information
through several methods
for the purpose of
production intelligence

44 / 149

The following are causes of
job stress except

45 / 149

Both theories believe that
high birth rate is the major
source of violence or war
but their views are slightly
different from each othe

46 / 149

Affiliation and religion have
become fundamental
elements of post
Nigeria

47 / 149

Nigeria has continued to
pose a huge
_risk to the country

48 / 149

The word security
emanated from the Greek
word se-curari meaning ___
___

49 / 149

War gaming is a ___ ___

50 / 149

__________ simulation
usually involves a process
whereby simulated people
use simulated tools in a
simulated world.

51 / 149

An earthquake can be said
to have__

52 / 149

architecture is also a very
viable approach to
computer and information
security.

53 / 149

believes that the best way
through which we can
control crime is to examine
the nature of the crime the
conditions that produces
such crimes as well as the
impact of the crimes

54 / 149

The approaches of
securities are________

55 / 149

Earthquakes are recorded
with ___

56 / 149

___ ____ is usually
involves submerging of land
by overflowing water

57 / 149

Karl marx is one of the
proponents of the youth
bulge theory

58 / 149

information warfare as
“struggles for control over
information activities”.

59 / 149

Approaches to Public
Relation Management in
security sectors are the
following except one.

60 / 149

Simulation helps to reduce
the situation of crisis in
patients as stressed by
(2004)

61 / 149

Idealism, Pluralism and
Realism are some of
approaches of

62 / 149

_______ is the crime of
seizing property through
violence or intimidation

63 / 149

After car jacking, one
should seek

64 / 149

usually, involves collecting,
analyzing, evaluating and
dissemination information
that can protect a nation
against internal threats.

65 / 149

crisis in North Nigerian
states where some antiWestern education Muslim
fanatics engaged security
agents in bloody battle is
called ___ ___

66 / 149

The following are the
proponent s of the youth
bulge theory except one

67 / 149

The following account for
the causes of domestic
violence except one

68 / 149

War gaming is a

69 / 149

usually involvos
submerging of land by
overflowing water

70 / 149

Idealism; meaning ___

71 / 149

The following are the forms
of violence crimes except
pick the incorrect options

72 / 149

Affiliation and religion have
become fundamental
elements of post
Nigeria

73 / 149

After robbery, you should
call the

74 / 149

Wa ever (1995) associates
the concept of

75 / 149

believes that crimes control
can be carried out through
the application of large pin
maps to illustrate the area
where crimes occurred

76 / 149

The following are the forms
of violence crimes except
____ ____ pick the
incorrect options

77 / 149

____ are spies used in
espionage intelligence
collection

78 / 149

Non traditional security
threats includes one

79 / 149

lack of
has really undermined the
capacity of the police to
perform its functions

80 / 149

threats are persons, things,
events or ideas, which pose
accidentally or deliberately
some degree or danger to
an asset

81 / 149

An earthquake is also
known as___

82 / 149

Individual can carry out a
just violence if the
Government is

83 / 149

Job design is a principle of
management

84 / 149

Avoid looking at the robbers
on the face so as to avoid
the issue of threat of

85 / 149

These are the variety of
international relations
theory of violence except
one

86 / 149

The following are the
proponent s of the youth
bulge theory except one

87 / 149

Data mining can also be
described as the process of
patterns from data

88 / 149

is the form of violence
crime in which a person
carries out violence against
another person within the
same household?

89 / 149

s a type of tropical cyclone
which is a generic term for
a low pressure system that
generally forms in the
tropics

90 / 149

something which simulates
a system or environment in
order to predict actual
behaviour

91 / 149

An earthquake is also
known as

92 / 149

Research finding has
shown that couples that
both provide to the family
on equal terms experience
less incidence of

93 / 149

Affiliation and religion have
become fundamental
elements of post ____
Nigeria

94 / 149

Intelligence personnel,
Government institutions,
Mass Media,
communication technology
e. t.(c) are

95 / 149

An earthquake can be said
to have
points

96 / 149

querries involve conducting
our investigation by moving
from unknown to known

97 / 149

Thomas Hobbes (1962)
who argued that the
essence of a state is to
guarantee the ___ ___
property and ensure law

98 / 149

____ ____is the form of
violence crime in which a
person carries out violence
against another person
within the same household?

99 / 149

Data mining uses a tool that
makes use of automated
analysis techniques

100 / 149

is a methods which involves
one secretly listening to a
private conversation or
discussion

101 / 149

terrorism is a ________
term.

102 / 149

something which simulates
a system or environment in
order to predict actual
behaviour

103 / 149

The following are the forms
of violence crimes except
pick the incorrect options

104 / 149

usually, involves collecting,
analyzing, evaluating and
dissemination information
that can protect a nation
against internal threats.

105 / 149

Hurricane entails sea
surface temperatures of at
least ___ ____

106 / 149

The methods of
including suggestibility,
Reid, Deception and torture

107 / 149

Anti-Virus designed
purposely to identify
_________

108 / 149

Identify one that is not the
theory of violence below

109 / 149

Microkenel can be
described as a computer
kernel that enables relevant

110 / 149

_____ is a good tool in
information supping which
are used by both criminals
and law enforcement
agents

111 / 149

usually involves
submerging of land by
overflowing water

112 / 149

Anti-Virus was designed
purposely to identify ___

113 / 149

Marxist theory is one of the
theories of crime control.

114 / 149

__ has become alternative
route through which people
can meet their needs?

115 / 149

usually, involves collecting,
analyzing, evaluating and
dissemination information
that can protect a nation
against internal threats.

116 / 149

Choose the one that does
not belong to the type of
trainings

117 / 149

Sudden motion in earth
caused by abrupt release of
slowly accumulated

118 / 149

The situation of domestic
violence is rampant among
the families where one of
the partners indulges in
very high consumption of
___ ___

119 / 149

___ is a type of tropical
cyclone which is a generic
term for a low pressure
system that generally forms
in the tropics

120 / 149

__________ Simulation
affords health care
providers an opportunity to
examine their capacity to
respond to emergency
situations.

121 / 149

is a methods which involves
one secretly listening to a
private conversation or
discussio

122 / 149

The approaches of
securities are___ ___ ___

123 / 149

The methods of
interrogation includes the
following except one .Pick
the odd one

124 / 149

Which tool is used to
prevent any strange or
unintended person from
comprehending the content
of a message

125 / 149

s the indent consequence
of communication
breakdown in the cycle of
domestic violence

126 / 149

Affiliation and religion have
become fundamental
elements of post
Nigeria

127 / 149

The following are the forms
of violence crimes except
______ pick the incorrect
options

128 / 149

is a process of gathering
and assembling information
through several methods
for the purpose of
production intelligence

129 / 149

It is very important to install
system,

130 / 149

Job design is a principle of
management.

131 / 149

According to ___________
(2004) simulation helps to
reduce the situation of crisis
in patients

132 / 149

Simulation helps to reduce
the situation of crisis in
patients as stressed by
(2004)

133 / 149

Identify the one that is not
types of security

134 / 149

The concept of security has
undergone a transition from
conceptualization to a nontraditional meaning.

135 / 149

________ is usually
involves submerging of land
by overflowing water

136 / 149

Microkenel can be
described as a computer
kernel that enables relevant

137 / 149

Earthquakes are recorded
with

138 / 149

The school of thought in
theories of violence are the
following except one

139 / 149

The word security
emanated from the Greek
word se-curari meaning

140 / 149

___ ____ are persons,
things, events or ideas,
which pose accidentally or
deliberately some degree or
danger to an asset

141 / 149

The following are the forms
of violence crimes except
pick the incorrect options

142 / 149

Another safety tip is to have
a comprehensive
for your vehicle.

143 / 149

___________ is also known
as war-gaming.

144 / 149

____ ___ can be described
as that aspect of security
designed purposely to
provide protection for
specific purposely to
provide protection for
specific infrastructure
particularly those
infrastructure considered
critical

145 / 149

___ something which
simulates a system or
environment in order to
predict actual behaviour

146 / 149

usually, involves collecting,
analyzing, evaluating and
dissemination information
that can protect a nation
against internal threats.

147 / 149

_____ involves putting
questions to persons with
the aim of getting
information which can help,
which can aid intelligence

148 / 149

The following are the
theories of crime control
except one

149 / 149

___ ___ is a place that
involves an aspect of
transportation

Rate this quiz