Loading...



Category: CSS244

0

CSS244

1 / 150

Piracy in the 17th and 18th
centuries attracted
penalty against the
offenders

2 / 150

Among the
Greeks,earthquake is said
to be caused
by____________

3 / 150

Etymologically,the word
"tsunami" emanate from
the______ language

4 / 150

who defines security threat
as development that
threaten the sovereignty of
the state________

5 / 150

During these periods in
pirates caught were
paraded before the public
and later subject to
execution.

6 / 150

A threat where the
offenders use deadly
weapons in the course of
carrying out their dastardly
act is called

7 / 150

The use of crime mapping
through installation of
security gadgets like
CCTV's and secret
camera's are helpful to
identify

8 / 150

A threat which often
involves the use of
instruments of intimidation
and coercion by a party(ies)
against another party is

9 / 150

A threat that takes place on
the road, streets, or even
bridges is

10 / 150

The transportation of a
woman against her will for
ransom is labelled

11 / 150

A hurricane is a type of
tropical ____________

12 / 150

0ne type of the anti-virus
softwares in the market
today is_______

13 / 150

The activities of disloyal
employees can affect the
collapse of any
if adequate mitigation
measures are not taken

14 / 150

involves conducting our
investigation by moving
from unknown to known

15 / 150

The process by which an
organisation protects and
secure its system
is_________

16 / 150

is often applied at various
levels of law enforcement in
any community to know the
situations of crime and
ways to reduce it

17 / 150

enables security
practitioners to put
observable crime data to
scientific testing through the
processes of data collation,
analysis and interpretation

18 / 150

is very helpful to unravel
secrets in organised crimes
like terrorism,
assassination, armed
robbery and electoral
practices.

19 / 150

This is one of the forms of
terrorism________

20 / 150

Hurricane is an example
of_____threat

21 / 150

The climatic forms of
security threats have
impact not only on man but
on _______

22 / 150

computer security provides
a platform which enhance
quality attributes like_____

23 / 150

One of the effects of
Environmental pollution is
________

24 / 150

Etymologically, the word
Assassin emanated from
the Arabic word

25 / 150

The period in which threat
to security usually involved
state to state aggression is

26 / 150

The introduction of mobile
computing with global
positioning system (GPS)
technologies has made it
possible to detect any
incidence of

27 / 150

In Lagos, Akala street in
Mushin, Ajegunle,
Okokomaiko, Iba, IjoraBadia are examples of
in criminal locations

28 / 150

The
threats include hurricane,
earthquake, drought and
flood.

29 / 150

The introduction of
system has really impacted
positively on the task of
data mining

30 / 150

A criminal offence which
occurs when a person
unlawfully obtains services
from a person is

31 / 150

Adamsite (DM) is a
chemical agent used as

32 / 150

In Engineering , risk is
defined as the pobabilityof
an accident times
______per accident

33 / 150

Another name for
demonstration is

34 / 150

The anti-colonial armed
struggle between the
imperial forces of portugal
and
mozambique[FRELIMO]
was in _______

35 / 150

The factors chiefly
responsible for various
environmental pollutions
are

36 / 150

The word terrorism was
popularised by the jacobins
who ruled____________

37 / 150

A criminal act that relate to
illegal acquisition of another
person's property is called

38 / 150

s essential to tactical
analysis necessary for
crime forecasting and
geographic profiling

39 / 150

The end of the Cold War in
____ has widened the
scope of security

40 / 150

Terrorism is a ______
threat

41 / 150

enables the law
enforcements to identify the
most probable residential
locations that criminals live.

42 / 150

With the experience from
the september 11 terrorist
attck in the USA, most
countries have fortified their
airports with______

43 / 150

In physical security,-is
installed for surveillance
and notification_________

44 / 150

The continual activites that
make protection of
mechanisms in information
security is _______

45 / 150

is the tool designated to
find previously unknown
knowledge through links,
association and patterns in
data.

46 / 150

who said that enemies may
hide destructive objects in
containers which they later
use against a country
_________

47 / 150

In Nigeria, where the
number of police personnel
is very inadequate to
provide any meaningful
security calls for

48 / 150

who defines terrorism as a
method whereby an
organised groups seeks to
achieve its avowed aims
through
violence__________

49 / 150

Before the advent of
internet ,computer virus
were usually spread
through __________

50 / 150

The measures and actions
taken by a company to
protects its corporate image
and establish regulations
is_______

51 / 150

is the tool to probe further
as a search light to what
may constitute an act of
criminality

52 / 150

The quality of the decision
we make after our
automated analysis largely
determine the amount of
success we record in the
course of our

53 / 150

The threat which involve
the malicious activities of
man is known as

54 / 150

When contaminations
cannot be processed and
neutralised by environment
we experienced _______
pollution

55 / 150

Authentication is a
technique in which we
create___________

56 / 150

The measures that ensure
every individual entitlement
to employment and living
wage is_________

57 / 150

History has shown that the
first public virus removal
was performed by____

58 / 150

The liquid or solid that has
very toxic effects on any
targeted persons and
ecosystem is_______

59 / 150

s a method through which
we analyse crime

60 / 150

Due to the Revolution in
modern technology some
computers demandinformation before an
access is______

61 / 150

One vital element of the
subject based query is

62 / 150

is very useful to assist
crime analysis to locate the
hot spots or locations
where particular crimes
often take place.

63 / 150

0ne of the two issues that
determine the existence of
risk is the _______

64 / 150

climatic hazards are
created by factors such as
_________

65 / 150

The god of earthquake in
Greek mythology
is____________

66 / 150

Terrorism is a ferocious use
of violence, a form of

67 / 150

The civil security which has
adequate knowledge of
incidence of risk through
the process of risk
education is ______

68 / 150

It is a fact that food security
is not luxury but_______

69 / 150

The type of robbery been
phenomenal in South
Africa, U.S.A, Sweden and
Nigeria is

70 / 150

Preparedness is the key
element of civil security
which has the view
to_____violence

71 / 150

Chloroacetophenone (CN)
is a chemical agent used
for

72 / 150

The
threats include
earthquakes, volcanic
eruptions, tsunamis (tidal
waves) and landslides

73 / 150

s the direct application that
comes form considering the
inherent geography in crime

74 / 150

Rapid rate of
industrialisation is one of
the factors responsible for
the problem of
___________in
communities

75 / 150

Another word for "tsunami"
is _______

76 / 150

A law enforcement function
that involves a systematic
analysis for identifying and
analysing patterns and
trends in crime and disorder
is called

77 / 150

One of themajor
environmental threats is
___________

78 / 150

Hydrogen cyanide (AC) is a
chemical agent that acts on
the

79 / 150

Link analysis is very
popular among
practitioners

80 / 150

The end of the cold war in
has widened the scope of
security studies

81 / 150

Seaports are major
shipping places that are
vulnerable to security
_________

82 / 150

The deliberate act of
destroying another person's
property by fire is

83 / 150

An organised rebellion is
aimed at over throwing a
constituted
through the use of
subversion and armed
conflict

84 / 150

If there is no provision of
sufficient security at the
seaport,this causes
_______in that country

85 / 150

Piracy usually involves a
very violent act perpetrated
by private parties of no
affiliation

86 / 150

what involves safety
against HIV-AIDS
pandemicsis__________

87 / 150

The mild application of
intimidation and violence to
bus passengers by criminal
gangs is known as

88 / 150

the geological security
threat is an aspect of

89 / 150

One of the basic manmade
security threats is _____

90 / 150

During the Westphalia
period, the major threat to
the political sovereignty of
any State usually emanated
from ____State

91 / 150

On food security,about -of
urban dwellers go about
with empty
stomach_______

92 / 150

Traditionally, the state is the
custodian and ultimate
beneficiary of the monopoly
use of violence as
advocated by

93 / 150

The qualitative risk analysis
is the effort to determine
the ______probability

94 / 150

is the process of analysing
data from different
perspectives and
summarising it into useful
information.

95 / 150

The progressive destruction
and less capable of
sustaining vegetation
is_________

96 / 150

helps us in our analysis of
data to have more
information about the
subject and gives a clearer
picture of the subject.

97 / 150

is a subfield in criminology
and security studies

98 / 150

1. According to ______the
State is the custodian and
ultimate beneficiary of the
monopoly use of violence

99 / 150

Terrorism is coined from the
word_____

100 / 150

The ________ threats
include armed robbery,
assassination, computer
intrusion, information
hacking and corruption.

101 / 150

Another name for sick-out
strike is

102 / 150

Insurgency is a form of
security threat

103 / 150

Infrastucture security is
designed to provide
protection for critical
infrastructures such as
__________

104 / 150

The act of having an
understanding of crime
distribution and information
about the demography is
known as

105 / 150

Basically, any intentional
and unintentional criminal
actions are 

106 / 150

The emergence of the Cold
War in____, the main
challenge against state has
been internal threat to
security

107 / 150

The leading factor to the
problem of climatic change
is the emission of _______
into the atmosphere

108 / 150

computer security is
described as an aspectof
_____security

109 / 150

One of the various
approaches which involves
a network of activities is
________

110 / 150

Security threat can be
described as a capacity to
destroy the vital interests of
other considered as

111 / 150

The Italian word for workto-rule strike is

112 / 150

In international airports ,it is
illegal for restaurant
operators to use plates
which terrorists may
convert to______

113 / 150

History has shown that the
first public virus removal
task was performed
in________

114 / 150

Traditionally, assassination
was synonymous to covet
sanctioned killing of any
person.

115 / 150

The emergence of the cold
war started in the yea

116 / 150

An effective public warnings
in responding to disaster
reduces _______

117 / 150

These tools above are
effective tools for
applications in crime
prevention and

118 / 150

The threat which includes
flood and cyclone is

119 / 150

According to ______ civil
security includes a better
interdepartmental
coordination

120 / 150

The quantitative risk
analysis is the effort to
determine
the____probability

121 / 150

The transportation of a
person against the person's
will, usually to hold the
person with illegal authority
for ransom is

122 / 150

the use of poisonous gases
on any targeted persons
and ecosystem is

123 / 150

Tsunami is usually mounted
by some geological
conditions like_______

124 / 150

The climatic change and
environment pollution in
Africa has increased
_________

125 / 150

Violent criminal behaviors
designed primarily to
generate fear in the
community for political
purposes is

126 / 150

The central focus of
computer security is the
techniques that enhance
the correct________

127 / 150

The terrorist attacks into the
world trade center was
linked to_________

128 / 150

Another name for
earthquake
is____________

129 / 150

what is the measures used
to provide physical
protecton of resourses
against deliberate and
accidental threats_______

130 / 150

Piracy is a violent crime
and robbery which takes
place on the

131 / 150

who said that a method by
which awareness and
understanding can be
translated into action
include a range of
activities______

132 / 150

The process of wrongfully
labelling an innocent
person as a criminal due to
mistakes is the result of our
automated data analysis is
called

133 / 150

Element of preparedness in
civil security approaches
includes________

134 / 150

The threat which usually
attract crowds with strong
emotional convictions to act
in unlawful ways is called

135 / 150

Climatic hazards basically
include hurricane, flood and

136 / 150

The internal or external
threat that challenges the
authority of the state is
_________

137 / 150

The first phase to the
incidence of hurricane
is_____________

138 / 150

Another name for
Knowledge Discovery in
Database (KDD) is

139 / 150

The process through which
we use computer to
develop a large database is
known as

140 / 150

The factors responsible for
the various pollutions that
generate environmental
hazards is________

141 / 150

The capacity of any human
and non-human elements
to destroy the vital interests
of others considered as
targets is _____

142 / 150

The threat which involves
entrapment of the
environment with various
forms of pollution is

143 / 150

One great obstacle to the
use of most of the warning
facilities is the erratic nature
of ________in Nigeria

144 / 150

s an essential tool of crime
analysis

145 / 150

security threat is classified
into_______ divisions

146 / 150

Thunderstorm is an
example________threat

147 / 150

Terrorism became a regular
vocabulary in the
year______

148 / 150

defined terrorism as the
theory behind the method
whereby an organised
group seeks to achieve its
avowed aims through the
use of violence

149 / 150

The type of demonstration
that can lead to the
breakdown of law and order
is

150 / 150

According to DeRosa, the
process which involves
transforming the data to
make them useful is known
as

Rate this quiz