Category: CSS244 0 CSS244 1 / 150 Piracy in the 17th and 18th centuries attracted penalty against the offenders Check 2 / 150 Among the Greeks,earthquake is said to be caused by____________ poison possesion pisdons poseidon 3 / 150 Etymologically,the word "tsunami" emanate from the______ language chinese indian japanese burmese 4 / 150 who defines security threat as development that threaten the sovereignty of the state________ waever water wargo whoem 5 / 150 During these periods in pirates caught were paraded before the public and later subject to execution. Check 6 / 150 A threat where the offenders use deadly weapons in the course of carrying out their dastardly act is called Check 7 / 150 The use of crime mapping through installation of security gadgets like CCTV's and secret camera's are helpful to identify Check 8 / 150 A threat which often involves the use of instruments of intimidation and coercion by a party(ies) against another party is Check 9 / 150 A threat that takes place on the road, streets, or even bridges is Check 10 / 150 The transportation of a woman against her will for ransom is labelled Check 11 / 150 A hurricane is a type of tropical ____________ cycle cyclone cyber cymber 12 / 150 0ne type of the anti-virus softwares in the market today is_______ AVG GVA AGV GAFEE 13 / 150 The activities of disloyal employees can affect the collapse of any if adequate mitigation measures are not taken Check 14 / 150 involves conducting our investigation by moving from unknown to known Check 15 / 150 The process by which an organisation protects and secure its system is_________ media security system security operation security information security 16 / 150 is often applied at various levels of law enforcement in any community to know the situations of crime and ways to reduce it Check 17 / 150 enables security practitioners to put observable crime data to scientific testing through the processes of data collation, analysis and interpretation Check 18 / 150 is very helpful to unravel secrets in organised crimes like terrorism, assassination, armed robbery and electoral practices. Check 19 / 150 This is one of the forms of terrorism________ civil disorder morality discipline moral disorder 20 / 150 Hurricane is an example of_____threat natural major natural manmade minor natural 21 / 150 The climatic forms of security threats have impact not only on man but on _______ sociosystem ecosystem physiosystem chemisystem 22 / 150 computer security provides a platform which enhance quality attributes like_____ breaches subsystem integrity errors 23 / 150 One of the effects of Environmental pollution is ________ Health risk political risk ethnic risk social risk 24 / 150 Etymologically, the word Assassin emanated from the Arabic word Check 25 / 150 The period in which threat to security usually involved state to state aggression is Check 26 / 150 The introduction of mobile computing with global positioning system (GPS) technologies has made it possible to detect any incidence of Check 27 / 150 In Lagos, Akala street in Mushin, Ajegunle, Okokomaiko, Iba, IjoraBadia are examples of in criminal locations Check 28 / 150 The threats include hurricane, earthquake, drought and flood. Check 29 / 150 The introduction of system has really impacted positively on the task of data mining Check 30 / 150 A criminal offence which occurs when a person unlawfully obtains services from a person is Check 31 / 150 Adamsite (DM) is a chemical agent used as Check 32 / 150 In Engineering , risk is defined as the pobabilityof an accident times ______per accident Gain minus surplus losses 33 / 150 Another name for demonstration is Check 34 / 150 The anti-colonial armed struggle between the imperial forces of portugal and mozambique[FRELIMO] was in _______ 1962 1963 1965 1964 35 / 150 The factors chiefly responsible for various environmental pollutions are Check 36 / 150 The word terrorism was popularised by the jacobins who ruled____________ england obohia france lagos 37 / 150 A criminal act that relate to illegal acquisition of another person's property is called Check 38 / 150 s essential to tactical analysis necessary for crime forecasting and geographic profiling Check 39 / 150 The end of the Cold War in ____ has widened the scope of security 1899 1989 1982 1984 40 / 150 Terrorism is a ______ threat artificial manmade major natural natural 41 / 150 enables the law enforcements to identify the most probable residential locations that criminals live. Check 42 / 150 With the experience from the september 11 terrorist attck in the USA, most countries have fortified their airports with______ sulphur detector metal detector weapon detector knife detector 43 / 150 In physical security,-is installed for surveillance and notification_________ smoke detectors cigar detectors dark detectors flash detectors 44 / 150 The continual activites that make protection of mechanisms in information security is _______ Due diligence Due mechanism Due attention Due care 45 / 150 is the tool designated to find previously unknown knowledge through links, association and patterns in data. Check 46 / 150 who said that enemies may hide destructive objects in containers which they later use against a country _________ Blue berg Green berg Yellow berg White berg 47 / 150 In Nigeria, where the number of police personnel is very inadequate to provide any meaningful security calls for Check 48 / 150 who defines terrorism as a method whereby an organised groups seeks to achieve its avowed aims through violence__________ softman hardman clevey streetman 49 / 150 Before the advent of internet ,computer virus were usually spread through __________ mps flash disk cyber floppy disks 50 / 150 The measures and actions taken by a company to protects its corporate image and establish regulations is_______ Due attention Due care Due diligence Due mechanism 51 / 150 is the tool to probe further as a search light to what may constitute an act of criminality Check 52 / 150 The quality of the decision we make after our automated analysis largely determine the amount of success we record in the course of our Check 53 / 150 The threat which involve the malicious activities of man is known as Check 54 / 150 When contaminations cannot be processed and neutralised by environment we experienced _______ pollution air biological chemical environmenta 55 / 150 Authentication is a technique in which we create___________ computer package password computer 56 / 150 The measures that ensure every individual entitlement to employment and living wage is_________ physiological security health security economic security social security 57 / 150 History has shown that the first public virus removal was performed by____ james fix Bernt fix McAfee Bernard fix 58 / 150 The liquid or solid that has very toxic effects on any targeted persons and ecosystem is_______ socialterrorism chemicalterrorism physicalterrorism economicterrorism 59 / 150 s a method through which we analyse crime Check 60 / 150 Due to the Revolution in modern technology some computers demandinformation before an access is______ chemimerics sociometrics physiometrics Biometrics 61 / 150 One vital element of the subject based query is Check 62 / 150 is very useful to assist crime analysis to locate the hot spots or locations where particular crimes often take place. Check 63 / 150 0ne of the two issues that determine the existence of risk is the _______ provision of risk provision of infrastructures provision of Health provision of utility 64 / 150 climatic hazards are created by factors such as _________ mudslide flood storm thunderstorm 65 / 150 The god of earthquake in Greek mythology is____________ poseidon poison possesion pisdons 66 / 150 Terrorism is a ferocious use of violence, a form of Check 67 / 150 The civil security which has adequate knowledge of incidence of risk through the process of risk education is ______ pre-incident protective actions throught incident warming 68 / 150 It is a fact that food security is not luxury but_______ sustenance accessibility luxury necessity 69 / 150 The type of robbery been phenomenal in South Africa, U.S.A, Sweden and Nigeria is Check 70 / 150 Preparedness is the key element of civil security which has the view to_____violence prevent support provide increase 71 / 150 Chloroacetophenone (CN) is a chemical agent used for Check 72 / 150 The threats include earthquakes, volcanic eruptions, tsunamis (tidal waves) and landslides Check 73 / 150 s the direct application that comes form considering the inherent geography in crime Check 74 / 150 Rapid rate of industrialisation is one of the factors responsible for the problem of ___________in communities house pollution environmental pollution physical pollutio earthquake 75 / 150 Another word for "tsunami" is _______ thunderstorm wave terrorism flood 76 / 150 A law enforcement function that involves a systematic analysis for identifying and analysing patterns and trends in crime and disorder is called Check 77 / 150 One of themajor environmental threats is ___________ hunger desertification poor yield rainfall 78 / 150 Hydrogen cyanide (AC) is a chemical agent that acts on the Check 79 / 150 Link analysis is very popular among practitioners Check 80 / 150 The end of the cold war in has widened the scope of security studies Check 81 / 150 Seaports are major shipping places that are vulnerable to security _________ goods products threats stores 82 / 150 The deliberate act of destroying another person's property by fire is Check 83 / 150 An organised rebellion is aimed at over throwing a constituted through the use of subversion and armed conflict Check 84 / 150 If there is no provision of sufficient security at the seaport,this causes _______in that country proliferation of ports proliferation of weapon proliferation of sea proliferation of airport 85 / 150 Piracy usually involves a very violent act perpetrated by private parties of no affiliation Check 86 / 150 what involves safety against HIV-AIDS pandemicsis__________ economic security health security physiological security social security 87 / 150 The mild application of intimidation and violence to bus passengers by criminal gangs is known as Check 88 / 150 the geological security threat is an aspect of Check 89 / 150 One of the basic manmade security threats is _____ thunderstorm hurricane extortion mudslide 90 / 150 During the Westphalia period, the major threat to the political sovereignty of any State usually emanated from ____State Inferior Europe Another Obohia 91 / 150 On food security,about -of urban dwellers go about with empty stomach_______ 0.5 0.8 0.7 0.6 92 / 150 Traditionally, the state is the custodian and ultimate beneficiary of the monopoly use of violence as advocated by Check 93 / 150 The qualitative risk analysis is the effort to determine the ______probability numerical not numerical hazards losses 94 / 150 is the process of analysing data from different perspectives and summarising it into useful information. Check 95 / 150 The progressive destruction and less capable of sustaining vegetation is_________ hunger pooryield rainfall desertification 96 / 150 helps us in our analysis of data to have more information about the subject and gives a clearer picture of the subject. Check 97 / 150 is a subfield in criminology and security studies Check 98 / 150 1. According to ______the State is the custodian and ultimate beneficiary of the monopoly use of violence Marx clement Max Weber Murphy clement Clement chukwunka 99 / 150 Terrorism is coined from the word_____ terror trouble treble tempest 100 / 150 The ________ threats include armed robbery, assassination, computer intrusion, information hacking and corruption. Nurture Nature Friction Manmade 101 / 150 Another name for sick-out strike is Check 102 / 150 Insurgency is a form of security threat Check 103 / 150 Infrastucture security is designed to provide protection for critical infrastructures such as __________ central bank savanah bank keystone bank first bank 104 / 150 The act of having an understanding of crime distribution and information about the demography is known as Check 105 / 150 Basically, any intentional and unintentional criminal actions are Check 106 / 150 The emergence of the Cold War in____, the main challenge against state has been internal threat to security 1984 1954 1946 1945 107 / 150 The leading factor to the problem of climatic change is the emission of _______ into the atmosphere s bluehousegases yellowhousegases blackhousegase greenhousegases 108 / 150 computer security is described as an aspectof _____security Hardware software information technical 109 / 150 One of the various approaches which involves a network of activities is ________ pre-incident risk communication risk educators preparedness 110 / 150 Security threat can be described as a capacity to destroy the vital interests of other considered as Check 111 / 150 The Italian word for workto-rule strike is Check 112 / 150 In international airports ,it is illegal for restaurant operators to use plates which terrorists may convert to______ weapons war plastic operator 113 / 150 History has shown that the first public virus removal task was performed in________ 2008 1808 1908 1987 114 / 150 Traditionally, assassination was synonymous to covet sanctioned killing of any person. Check 115 / 150 The emergence of the cold war started in the yea Check 116 / 150 An effective public warnings in responding to disaster reduces _______ fatality development warning risk communication 117 / 150 These tools above are effective tools for applications in crime prevention and Check 118 / 150 The threat which includes flood and cyclone is Check 119 / 150 According to ______ civil security includes a better interdepartmental coordination El-shamar hamar shalamanov El-shalamar 120 / 150 The quantitative risk analysis is the effort to determine the____probability hazards numerial not numerial losses 121 / 150 The transportation of a person against the person's will, usually to hold the person with illegal authority for ransom is Check 122 / 150 the use of poisonous gases on any targeted persons and ecosystem is Check 123 / 150 Tsunami is usually mounted by some geological conditions like_______ earthquake ocean property energy losses 124 / 150 The climatic change and environment pollution in Africa has increased _________ hazards poverty rainfall flood 125 / 150 Violent criminal behaviors designed primarily to generate fear in the community for political purposes is Check 126 / 150 The central focus of computer security is the techniques that enhance the correct________ process operation information security 127 / 150 The terrorist attacks into the world trade center was linked to_________ BokoHaram Shiite Al-shabab Al-Qaeda 128 / 150 Another name for earthquake is____________ trembor treble tremor terrible 129 / 150 what is the measures used to provide physical protecton of resourses against deliberate and accidental threats_______ physical security social threat Health security political security 130 / 150 Piracy is a violent crime and robbery which takes place on the Check 131 / 150 who said that a method by which awareness and understanding can be translated into action include a range of activities______ luhman shalamar whotton Amanda 132 / 150 The process of wrongfully labelling an innocent person as a criminal due to mistakes is the result of our automated data analysis is called Check 133 / 150 Element of preparedness in civil security approaches includes________ adoption of nearness adoption of monouse adoption ofdual use adoption of terror 134 / 150 The threat which usually attract crowds with strong emotional convictions to act in unlawful ways is called Check 135 / 150 Climatic hazards basically include hurricane, flood and Check 136 / 150 The internal or external threat that challenges the authority of the state is _________ economic threat security threat moral threat social threat 137 / 150 The first phase to the incidence of hurricane is_____________ tropical storm tropical disturbance tropical disturbance heavy rainfall 138 / 150 Another name for Knowledge Discovery in Database (KDD) is Check 139 / 150 The process through which we use computer to develop a large database is known as Check 140 / 150 The factors responsible for the various pollutions that generate environmental hazards is________ anthropoloic throwpoloic anthropogenic anthonygenic 141 / 150 The capacity of any human and non-human elements to destroy the vital interests of others considered as targets is _____ Security threat social threat economic terrorism Emotional threat 142 / 150 The threat which involves entrapment of the environment with various forms of pollution is Check 143 / 150 One great obstacle to the use of most of the warning facilities is the erratic nature of ________in Nigeria communication power supply systems Hospital 144 / 150 s an essential tool of crime analysis Check 145 / 150 security threat is classified into_______ divisions 4 2 5 3 146 / 150 Thunderstorm is an example________threat natural major natural major natural minor natural 147 / 150 Terrorism became a regular vocabulary in the year______ 1798 1698 1898 1998 148 / 150 defined terrorism as the theory behind the method whereby an organised group seeks to achieve its avowed aims through the use of violence Check 149 / 150 The type of demonstration that can lead to the breakdown of law and order is Check 150 / 150 According to DeRosa, the process which involves transforming the data to make them useful is known as Check Restart quiz Rate this quiz Send feedback